Vulnerabilites related to intel - non-volatile_memory_update_utility
Vulnerability from fkie_nvd
Published
2023-02-16 21:15
Modified
2024-11-21 07:23
Summary
Uncontrolled search path in some Intel(R) Network Adapter installer software may allow an authenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:administrative_tools_for_intel_network_adapters:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCACAA3E-0515-4A2E-BD94-57B549640878",
              "versionEndExcluding": "27.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:non-volatile_memory_update_utility:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E312868-99F3-488E-B03F-A9291D93798A",
              "versionEndExcluding": "4.01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_e810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAAF14CD-89F6-49F3-8E74-3EE0535D8513",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87F3AB90-46C3-48DD-B0B4-4E036712ECCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1_for_ocp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F81244-F28E-416A-B3B6-7A1F79D8AC73",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1_for_ocp_3.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F06D5B95-4DD0-4BEB-A32A-AAE300046670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D582770B-4CCD-43A4-B218-FFD9AE530A24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda2_for_ocp_3.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA63976A-922C-4E50-8D69-D7F6A62AD31E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E006D87-BC0F-485E-931D-789221B9D876",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda2_for_ocp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D255A8A-BB76-4F8E-9E44-3F391AA16CE3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda2_for_ocp_3.0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F0C290-6882-49EB-B89A-9CFCC1A4BEEA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0F1118-C181-42B4-B3C4-A5AE9F59654E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD53D7BD-4119-4221-8A83-1268F3CA715E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810-cam1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "839854C2-8442-4EB8-8FE0-434FEAD3B559",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810-cam2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42E8F0FF-94C1-4AB5-A9D3-D2963A2200F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810-xxvam2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFC7B304-7705-40F7-A357-5F7E8FD71E47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Uncontrolled search path in some Intel(R) Network Adapter installer software may allow an authenticated user to potentially enable escalation of privilege via local access."
    }
  ],
  "id": "CVE-2022-41314",
  "lastModified": "2024-11-21T07:23:01.657",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-02-16T21:15:13.823",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2022-41314 (GCVE-0-2022-41314)
Vulnerability from cvelistv5
Published
2023-02-16 20:00
Modified
2025-01-27 18:12
CWE
  • escalation of privilege
Summary
Uncontrolled search path in some Intel(R) Network Adapter installer software may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) Network Adapter installer software Version: See references
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T12:42:46.124Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-41314",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-27T17:29:05.448644Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-27T18:12:28.041Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Network Adapter installer software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Uncontrolled search path in some Intel(R) Network Adapter installer software may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-02-16T20:00:30.335Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-41314",
    "datePublished": "2023-02-16T20:00:30.335Z",
    "dateReserved": "2022-09-27T00:28:29.127Z",
    "dateUpdated": "2025-01-27T18:12:28.041Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}