Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-38787 (GCVE-0-2022-38787)
Vulnerability from cvelistv5 – Published: 2023-05-10 13:17 – Updated: 2025-01-27 18:04
VLAI?
EPSS
Summary
Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
5.7 (Medium)
CWE
- escalation of privilege
- CWE-20 - Improper input validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) FPGA products |
Affected:
before version 2.7.0 Hotfix
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T11:02:14.597Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-38787",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-27T17:27:43.153667Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-27T18:04:04.945Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) FPGA products",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 2.7.0 Hotfix"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-20",
"description": "Improper input validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-10T13:17:02.449Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-38787",
"datePublished": "2023-05-10T13:17:02.449Z",
"dateReserved": "2022-09-28T14:53:53.448Z",
"dateUpdated": "2025-01-27T18:04:04.945Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T11:02:14.597Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-38787\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-27T17:27:43.153667Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-27T17:27:44.766Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"Intel(R) FPGA products\", \"versions\": [{\"status\": \"affected\", \"version\": \"before version 2.7.0 Hotfix\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"escalation of privilege\"}, {\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"Improper input validation\"}]}], \"providerMetadata\": {\"orgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"shortName\": \"intel\", \"dateUpdated\": \"2023-05-10T13:17:02.449Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-38787\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-27T18:04:04.945Z\", \"dateReserved\": \"2022-09-28T14:53:53.448Z\", \"assignerOrgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"datePublished\": \"2023-05-10T13:17:02.449Z\", \"assignerShortName\": \"intel\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-7QCJ-673Q-XF98
Vulnerability from github – Published: 2023-05-10 15:30 – Updated: 2024-04-04 03:59
VLAI?
Details
Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
5.7 (Medium)
{
"affected": [],
"aliases": [
"CVE-2022-38787"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-05-10T14:15:14Z",
"severity": "HIGH"
},
"details": "Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.",
"id": "GHSA-7qcj-673q-xf98",
"modified": "2024-04-04T03:59:25Z",
"published": "2023-05-10T15:30:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38787"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
CERTFR-2023-AVI-0371
Vulnerability from certfr_avis - Published: 2023-05-10 - Updated: 2023-05-10
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- 2023.2 IPU – BIOS
- DSP Builder pour Intel FPGAs Pro Edition Software
- Intel NUC BIOS Firmware
- Intel Connect M Android App
- Intel DCM Software
- Intel DCM
- Intel EMA Configuration Tool and Intel MC Software
- Intel EMA Software
- Intel FPGA Firmware
- Intel IPP Cryptography
- Intel MacCPUID Software
- Intel NUC BIOS Update Software
- Intel NUC Laptop Element Software
- Intel NUC Pro Software Suite
- Intel NUC Software Studio Service Installer
- Intel OFU Software
- Intel Pathfinder pour RISC-V
- Intel QAT Driver
- Intel QAT Engine pour OpenSSL
- Intel QAT
- Intel Quartus Prime Pro Software
- Intel Retail Edge Mobile App
- Intel SCS Add-on Software Installer
- Intel SCS Software
- Intel SUR Software
- Intel Server Board BMC Firmware
- Intel Smart Campus Android App
- Intel Trace Analyzer and Collector Software
- Intel Unite Android App
- Intel Unite Client Software
- Intel Unite Plugin SDK
- Intel VROC Software
- Intel VTune™ Profiler
- Intel i915 Graphics Drivers pour Linux
- Intel oneAPI Toolkit and Component Software Installers
- Open CAS
- WULT Software
Pour plus d'informations, veuillez-vous référer aux avis de l'éditeur.
Impacted products
| Vendor | Product | Description |
|---|
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003e2023.2 IPU \u2013 BIOS\u003c/li\u003e \u003cli\u003eDSP Builder pour Intel FPGAs Pro Edition Software\u003c/li\u003e \u003cli\u003eIntel NUC BIOS Firmware\u003c/li\u003e \u003cli\u003eIntel Connect M Android App\u003c/li\u003e \u003cli\u003eIntel DCM Software\u003c/li\u003e \u003cli\u003eIntel DCM\u003c/li\u003e \u003cli\u003eIntel EMA Configuration Tool and Intel MC Software\u003c/li\u003e \u003cli\u003eIntel EMA Software\u003c/li\u003e \u003cli\u003eIntel FPGA Firmware\u003c/li\u003e \u003cli\u003eIntel IPP Cryptography\u003c/li\u003e \u003cli\u003eIntel MacCPUID Software\u003c/li\u003e \u003cli\u003eIntel NUC BIOS Update Software\u003c/li\u003e \u003cli\u003eIntel NUC Laptop Element Software\u003c/li\u003e \u003cli\u003eIntel NUC Pro Software Suite\u003c/li\u003e \u003cli\u003eIntel NUC Software Studio Service Installer\u003c/li\u003e \u003cli\u003eIntel OFU Software\u003c/li\u003e \u003cli\u003eIntel Pathfinder pour RISC-V\u003c/li\u003e \u003cli\u003eIntel QAT Driver\u003c/li\u003e \u003cli\u003eIntel QAT Engine pour OpenSSL\u003c/li\u003e \u003cli\u003eIntel QAT\u003c/li\u003e \u003cli\u003eIntel Quartus Prime Pro Software\u003c/li\u003e \u003cli\u003eIntel Retail Edge Mobile App\u003c/li\u003e \u003cli\u003eIntel SCS Add-on Software Installer\u003c/li\u003e \u003cli\u003eIntel SCS Software\u003c/li\u003e \u003cli\u003eIntel SUR Software\u003c/li\u003e \u003cli\u003eIntel Server Board BMC Firmware\u003c/li\u003e \u003cli\u003eIntel Smart Campus Android App\u003c/li\u003e \u003cli\u003eIntel Trace Analyzer and Collector Software\u003c/li\u003e \u003cli\u003eIntel Unite Android App\u003c/li\u003e \u003cli\u003eIntel Unite Client Software\u003c/li\u003e \u003cli\u003eIntel Unite Plugin SDK\u003c/li\u003e \u003cli\u003eIntel VROC Software\u003c/li\u003e \u003cli\u003eIntel VTune\u2122 Profiler\u003c/li\u003e \u003cli\u003eIntel i915 Graphics Drivers pour Linux\u003c/li\u003e \u003cli\u003eIntel oneAPI Toolkit and Component Software Installers\u003c/li\u003e \u003cli\u003eOpen CAS\u003c/li\u003e \u003cli\u003eWULT Software\u003c/li\u003e \u003c/ul\u003e \u003cp\u003ePour plus d\u0027informations, veuillez-vous r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur.\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-23910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23910"
},
{
"name": "CVE-2023-22443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22443"
},
{
"name": "CVE-2022-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40974"
},
{
"name": "CVE-2022-41628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41628"
},
{
"name": "CVE-2022-43465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43465"
},
{
"name": "CVE-2022-43475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43475"
},
{
"name": "CVE-2022-25976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25976"
},
{
"name": "CVE-2022-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21239"
},
{
"name": "CVE-2022-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40972"
},
{
"name": "CVE-2023-27382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27382"
},
{
"name": "CVE-2022-37409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37409"
},
{
"name": "CVE-2023-22355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22355"
},
{
"name": "CVE-2022-44619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44619"
},
{
"name": "CVE-2022-34855",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34855"
},
{
"name": "CVE-2022-41801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41801"
},
{
"name": "CVE-2022-36391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36391"
},
{
"name": "CVE-2023-25175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25175"
},
{
"name": "CVE-2022-41699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41699"
},
{
"name": "CVE-2023-22312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22312"
},
{
"name": "CVE-2022-34848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34848"
},
{
"name": "CVE-2022-46279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46279"
},
{
"name": "CVE-2022-46645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46645"
},
{
"name": "CVE-2023-25771",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25771"
},
{
"name": "CVE-2023-22440",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22440"
},
{
"name": "CVE-2022-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38087"
},
{
"name": "CVE-2022-43507",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43507"
},
{
"name": "CVE-2022-32578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32578"
},
{
"name": "CVE-2023-22297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22297"
},
{
"name": "CVE-2023-22447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22447"
},
{
"name": "CVE-2022-45128",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45128"
},
{
"name": "CVE-2022-30338",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30338"
},
{
"name": "CVE-2023-25776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25776"
},
{
"name": "CVE-2023-22379",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22379"
},
{
"name": "CVE-2022-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42465"
},
{
"name": "CVE-2022-42878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42878"
},
{
"name": "CVE-2023-23573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23573"
},
{
"name": "CVE-2022-36339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36339"
},
{
"name": "CVE-2022-41982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41982"
},
{
"name": "CVE-2023-27298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27298"
},
{
"name": "CVE-2022-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41771"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-25179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25179"
},
{
"name": "CVE-2023-23909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23909"
},
{
"name": "CVE-2022-38787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38787"
},
{
"name": "CVE-2023-27386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27386"
},
{
"name": "CVE-2023-23569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23569"
},
{
"name": "CVE-2022-41769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41769"
},
{
"name": "CVE-2022-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38103"
},
{
"name": "CVE-2022-31477",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31477"
},
{
"name": "CVE-2022-33894",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33894"
},
{
"name": "CVE-2022-28699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28699"
},
{
"name": "CVE-2022-46656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46656"
},
{
"name": "CVE-2022-43474",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43474"
},
{
"name": "CVE-2022-41784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41784"
},
{
"name": "CVE-2022-40685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40685"
},
{
"name": "CVE-2023-28411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28411"
},
{
"name": "CVE-2022-41658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41658"
},
{
"name": "CVE-2022-32766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32766"
},
{
"name": "CVE-2022-29919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29919"
},
{
"name": "CVE-2022-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38101"
},
{
"name": "CVE-2023-25545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25545"
},
{
"name": "CVE-2022-29508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29508"
},
{
"name": "CVE-2023-22661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22661"
},
{
"name": "CVE-2022-34147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34147"
},
{
"name": "CVE-2022-41690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41690"
},
{
"name": "CVE-2023-22442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22442"
},
{
"name": "CVE-2022-41979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41979"
},
{
"name": "CVE-2022-41693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41693"
},
{
"name": "CVE-2022-25772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25772"
},
{
"name": "CVE-2022-27180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27180"
},
{
"name": "CVE-2022-33963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33963"
},
{
"name": "CVE-2023-24475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24475"
},
{
"name": "CVE-2022-41646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41646"
},
{
"name": "CVE-2022-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40207"
},
{
"name": "CVE-2022-32577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32577"
},
{
"name": "CVE-2022-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40210"
},
{
"name": "CVE-2022-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21804"
},
{
"name": "CVE-2022-44610",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44610"
},
{
"name": "CVE-2022-41621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41621"
},
{
"name": "CVE-2022-41610",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41610"
},
{
"name": "CVE-2023-23580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23580"
},
{
"name": "CVE-2022-41687",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41687"
},
{
"name": "CVE-2022-32576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32576"
},
{
"name": "CVE-2022-37327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37327"
},
{
"name": "CVE-2022-41998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41998"
},
{
"name": "CVE-2022-41808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41808"
},
{
"name": "CVE-2022-32582",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32582"
}
],
"initial_release_date": "2023-05-10T00:00:00",
"last_revision_date": "2023-05-10T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0371",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00809 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00816 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00816.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00886 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00886.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00797 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00797.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00819 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00798 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00798.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00796 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00796.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00853 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00853.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00825 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00825.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00771 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00771.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00807 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00805 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00855 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00855.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00847 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00802 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00692 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00692.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00854 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00854.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00799 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00799.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00785 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00785.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00784 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00784.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00834 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00834.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00792 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00792.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00824 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00782 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00782.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00778 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00778.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00839 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00806 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00806.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00772 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00772.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00780 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00779 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00779.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00788 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00788.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00808 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00808.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00777 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00832 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00832.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00723 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00723.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00827 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00827.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00815 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00815.html"
}
]
}
GSD-2022-38787
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-38787",
"id": "GSD-2022-38787"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-38787"
],
"details": "Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.",
"id": "GSD-2022-38787",
"modified": "2023-12-13T01:19:22.351405Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2022-38787",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) FPGA products",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before version 2.7.0 Hotfix"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
},
{
"cweId": "CWE-20",
"lang": "eng",
"value": "Improper input validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_f-series_019_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_f-series_019:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_f-series_023_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_f-series_023:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_f-series_006_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_f-series_006:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_f-series_008_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_f-series_008:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_f-series_027_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_f-series_027:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_f-series_014_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_f-series_014:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_f-series_012_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_f-series_012:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_f-series_022_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_f-series_022:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_i-series_022_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_i-series_022:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_i-series_041_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_i-series_041:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_i-series_035_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_i-series_035:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_i-series_027_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_i-series_027:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_i-series_019_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_i-series_019:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_i-series_040_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_i-series_040:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_i-series_023_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_i-series_023:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:agilex_7_fpga_m-series_039_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:agilex_7_fpga_m-series_039:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_nx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_nx_2100_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_dx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_dx_2800_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_dx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_dx_2100_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_dx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_dx_1100_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_tx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_tx_1650_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_tx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_tx_2500_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_tx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_tx_2100_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_tx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_tx_850_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_tx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_tx_400_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_tx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_tx_1100_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_tx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_tx_2800_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_sx_650_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_sx_650_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_sx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_sx_400_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_sx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_sx_1100_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_sx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_sx_850_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_sx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_sx_1650_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_sx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_sx_2100_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_sx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_sx_2500_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_sx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_sx_2800_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_mx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_mx_2100_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_mx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_mx_1650_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_2110_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_2110_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_1660_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_1660_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_650_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_650_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_400_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_850_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_2100_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_1100_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_2500_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_10m_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_10m_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_2800_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:stratix_10_gx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:stratix_10_gx_1650_fpga:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2022-38787"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-05-22T14:24Z",
"publishedDate": "2023-05-10T14:15Z"
}
}
}
FKIE_CVE-2022-38787
Vulnerability from fkie_nvd - Published: 2023-05-10 14:15 - Updated: 2024-11-21 07:17
Severity ?
5.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| intel | agilex_7_fpga_f-series_019_firmware | * | |
| intel | agilex_7_fpga_f-series_019 | - | |
| intel | agilex_7_fpga_f-series_023_firmware | * | |
| intel | agilex_7_fpga_f-series_023 | - | |
| intel | agilex_7_fpga_f-series_006_firmware | * | |
| intel | agilex_7_fpga_f-series_006 | - | |
| intel | agilex_7_fpga_f-series_008_firmware | * | |
| intel | agilex_7_fpga_f-series_008 | - | |
| intel | agilex_7_fpga_f-series_027_firmware | * | |
| intel | agilex_7_fpga_f-series_027 | - | |
| intel | agilex_7_fpga_f-series_014_firmware | * | |
| intel | agilex_7_fpga_f-series_014 | - | |
| intel | agilex_7_fpga_f-series_012_firmware | * | |
| intel | agilex_7_fpga_f-series_012 | - | |
| intel | agilex_7_fpga_f-series_022_firmware | * | |
| intel | agilex_7_fpga_f-series_022 | - | |
| intel | agilex_7_fpga_i-series_022_firmware | * | |
| intel | agilex_7_fpga_i-series_022 | - | |
| intel | agilex_7_fpga_i-series_041_firmware | * | |
| intel | agilex_7_fpga_i-series_041 | - | |
| intel | agilex_7_fpga_i-series_035_firmware | * | |
| intel | agilex_7_fpga_i-series_035 | - | |
| intel | agilex_7_fpga_i-series_027_firmware | * | |
| intel | agilex_7_fpga_i-series_027 | - | |
| intel | agilex_7_fpga_i-series_019_firmware | * | |
| intel | agilex_7_fpga_i-series_019 | - | |
| intel | agilex_7_fpga_i-series_040_firmware | * | |
| intel | agilex_7_fpga_i-series_040 | - | |
| intel | agilex_7_fpga_i-series_023_firmware | * | |
| intel | agilex_7_fpga_i-series_023 | - | |
| intel | agilex_7_fpga_m-series_039_firmware | * | |
| intel | agilex_7_fpga_m-series_039 | - | |
| intel | stratix_10_nx_2100_fpga_firmware | * | |
| intel | stratix_10_nx_2100_fpga | - | |
| intel | stratix_10_dx_2800_fpga_firmware | * | |
| intel | stratix_10_dx_2800_fpga | - | |
| intel | stratix_10_dx_2100_fpga_firmware | * | |
| intel | stratix_10_dx_2100_fpga | - | |
| intel | stratix_10_dx_1100_fpga_firmware | * | |
| intel | stratix_10_dx_1100_fpga | - | |
| intel | stratix_10_tx_1650_fpga_firmware | * | |
| intel | stratix_10_tx_1650_fpga | - | |
| intel | stratix_10_tx_2500_fpga_firmware | * | |
| intel | stratix_10_tx_2500_fpga | - | |
| intel | stratix_10_tx_2100_fpga_firmware | * | |
| intel | stratix_10_tx_2100_fpga | - | |
| intel | stratix_10_tx_850_fpga_firmware | * | |
| intel | stratix_10_tx_850_fpga | - | |
| intel | stratix_10_tx_400_fpga_firmware | * | |
| intel | stratix_10_tx_400_fpga | - | |
| intel | stratix_10_tx_1100_fpga_firmware | * | |
| intel | stratix_10_tx_1100_fpga | - | |
| intel | stratix_10_tx_2800_fpga_firmware | * | |
| intel | stratix_10_tx_2800_fpga | - | |
| intel | stratix_10_sx_650_fpga_firmware | * | |
| intel | stratix_10_sx_650_fpga | - | |
| intel | stratix_10_sx_400_fpga_firmware | * | |
| intel | stratix_10_sx_400_fpga | - | |
| intel | stratix_10_sx_1100_fpga_firmware | * | |
| intel | stratix_10_sx_1100_fpga | - | |
| intel | stratix_10_sx_850_fpga_firmware | * | |
| intel | stratix_10_sx_850_fpga | - | |
| intel | stratix_10_sx_1650_fpga_firmware | * | |
| intel | stratix_10_sx_1650_fpga | - | |
| intel | stratix_10_sx_2100_fpga_firmware | * | |
| intel | stratix_10_sx_2100_fpga | - | |
| intel | stratix_10_sx_2500_fpga_firmware | * | |
| intel | stratix_10_sx_2500_fpga | - | |
| intel | stratix_10_sx_2800_fpga_firmware | * | |
| intel | stratix_10_sx_2800_fpga | - | |
| intel | stratix_10_mx_2100_fpga_firmware | * | |
| intel | stratix_10_mx_2100_fpga | - | |
| intel | stratix_10_mx_1650_fpga_firmware | * | |
| intel | stratix_10_mx_1650_fpga | - | |
| intel | stratix_10_gx_2110_fpga_firmware | * | |
| intel | stratix_10_gx_2110_fpga | - | |
| intel | stratix_10_gx_1660_fpga_firmware | * | |
| intel | stratix_10_gx_1660_fpga | - | |
| intel | stratix_10_gx_650_fpga_firmware | * | |
| intel | stratix_10_gx_650_fpga | - | |
| intel | stratix_10_gx_400_fpga_firmware | * | |
| intel | stratix_10_gx_400_fpga | - | |
| intel | stratix_10_gx_850_fpga_firmware | * | |
| intel | stratix_10_gx_850_fpga | - | |
| intel | stratix_10_gx_2100_fpga_firmware | * | |
| intel | stratix_10_gx_2100_fpga | - | |
| intel | stratix_10_gx_1100_fpga_firmware | * | |
| intel | stratix_10_gx_1100_fpga | - | |
| intel | stratix_10_gx_2500_fpga_firmware | * | |
| intel | stratix_10_gx_2500_fpga | - | |
| intel | stratix_10_gx_10m_fpga_firmware | * | |
| intel | stratix_10_gx_10m_fpga | - | |
| intel | stratix_10_gx_2800_fpga_firmware | * | |
| intel | stratix_10_gx_2800_fpga | - | |
| intel | stratix_10_gx_1650_fpga_firmware | * | |
| intel | stratix_10_gx_1650_fpga | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_019_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6A97E4-62A9-4237-A13E-0BD55BDD8A42",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D68665D-53D4-49C5-8A06-A720EE9F1267",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_023_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "925DC85E-37C8-4221-8F47-17D9BAB9FF34",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_023:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3366464F-0854-4D57-99F0-91C0F8C408EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_006_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4901DDCC-11B9-4ED9-A3C6-C77B3F465ED8",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_006:-:*:*:*:*:*:*:*",
"matchCriteriaId": "481A2231-C217-42F4-AF28-94490AE56AB9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_008_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA90A9A-F961-4A5E-8506-2A9F07963077",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CB6868D-4587-409D-B64C-36240DDDC19C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_027_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57AC32ED-85E1-4D77-B9F1-AFCF702142FF",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_027:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBD8AC9B-AD29-4C14-9DEF-91B678ACB554",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_014_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48E5C24D-9718-4DAC-90D5-FAD771C25254",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_014:-:*:*:*:*:*:*:*",
"matchCriteriaId": "031DEF2A-B186-418E-85DC-9F03DB95B8D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_012_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "645E4E1D-83FF-490D-A7A9-A124D64AF26B",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB7671C-CAC4-46E7-A1B4-03C71472865C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_022_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE0B8F0-2411-4FA7-A569-BF6765F4EA19",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C67013E-48AA-4D44-8435-B782F77B48AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_022_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC7259A2-1545-4452-BEB5-536A8A1DFD5E",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "934E3D45-0BFB-421B-B6C3-CB4823ECD40F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_041_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF0D99C4-44B7-4345-B572-BFA74299C572",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_041:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD1F07B-8857-478F-B8AA-7FBB1FDA0B02",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_035_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D95BF10C-7890-4040-A3A5-756FD2D9A8DD",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8501A5FD-95DB-4F4F-A1B6-7FF98C286E88",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_027_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B852565A-0D55-489A-B5AC-C2CEC72E4847",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_027:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E32704B5-C354-4A28-A3C5-BE8DC5CC87E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_019_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6844407-D1FD-4E9D-85E6-4E7B3AD798A9",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C77709F7-0B2D-415D-AE47-76BECE0202F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_040_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB9E255-1888-4D8D-996F-7654680F1A20",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A88039FE-FEB0-4C51-8CAC-CB59014AD964",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_023_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84224732-2E15-42E7-A87A-E39973A73391",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_023:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A32D9F-D82D-4610-A6CA-B30EC8050DF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_m-series_039_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBED8EF7-CA05-4180-BEF2-FFAD46FF5E4F",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_m-series_039:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6866ED35-765A-4C2B-9474-A4BC38BB9AAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_nx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A484B58-4AE8-4729-BE38-0231674DE114",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_nx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DFD6254-F1EC-4839-B0E9-EED795C1643C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_dx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50F5F0B6-6F56-4B2B-B6B5-72F498A99569",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_dx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8CBB78E-3661-42F2-9168-AA636C2FEB4D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_dx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16F78C58-38A3-4C5F-8387-DDEDE63D8B8C",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_dx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2563221-8650-4BB8-9979-0DA77E76C20F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_dx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75C77642-7FB5-47F2-81D2-B40BA667EB9C",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_dx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA405E82-8737-4337-9823-A6FB3747A7FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC877E90-D6A3-41D3-BA75-EF370336FD5D",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F841BCA0-603D-4DF7-8DAC-344BA3FA7B47",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "502D348D-7D50-414C-9AD3-2C137BF3DC9A",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_2500_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF940E7E-56C1-4810-9FF9-34797121C142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC99440-D6C8-4557-9839-EF8361582157",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D38BF0AF-554D-4026-983B-CEB85AA32193",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE55A0-0EC6-4487-BE4E-077FC7F2325F",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_850_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24730E73-BAE9-4CA5-B193-7E8266C865AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6427DE9-3547-45D8-BCA5-AC0DAAC1B528",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_400_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBDD342-2160-42A0-96D0-2A00C624D950",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA74AF2E-8605-4D52-A4BE-7DCBA3E5F2BB",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E68CD4-9853-41EE-9BC8-8376B620D04F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A30B6E5B-2F7A-4351-B317-702E658D9370",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC3C9FD-C8FD-4402-A5A5-D95D1D124A6B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F20BA1A1-E4D9-4222-8E8E-88A3BB7101C9",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C00F9533-5277-4F6F-96F6-B3B702B8E2C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9584CC-18D9-4638-A712-91B6169412B8",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_400_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE8A237-43CA-469C-B5EA-1F194B27EC1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C9EF34B-F505-4AD9-8A6D-14084B0E11A2",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F9A8832-4C8A-46B9-9FB7-A2E6653AF4EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55F18140-1D0B-40E3-94D0-362B34A8ADFC",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_850_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6482AA9D-95E3-4E42-9117-3F72265B3168",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DF406F7B-7850-4103-B2B2-0AB66D63E9BD",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5055D09C-D118-40A4-86F7-369C97111FF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B090795-73EC-42DF-B403-13663487A8EA",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6836FE2-D66D-4E53-9C44-EC1A7578361B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95ACB8D8-C6D0-4F5B-BDA4-FCBA4EC25B48",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_2500_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FA24707-EC97-4877-A183-1C36146F55D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D72E987-4C70-47D9-94F3-33448C9B4635",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1202442F-755C-40A3-A38B-A695721F6F19",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_mx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDEAAF89-50A9-4FD3-AE59-D56E04A6BCA8",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_mx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0491BF82-8D81-4514-AE7E-2736BA02F5A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_mx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DCA7474-A2F1-45C2-A474-03A329036D48",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_mx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A50071C6-AD81-4280-9002-FD2A07371EAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2110_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1D4D52-9788-4A78-9ED1-8C5EA5B2F5FE",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2110_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64562A7E-53D7-4175-B02E-50A9BA8170E9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_1660_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "823336BC-C6EB-4BED-A384-C81B50FF669D",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_1660_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "277040B2-D525-43BC-8899-5CFB10F95D71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DDB7711-F2D8-46EA-94C1-6FE8F5BC9C7E",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A462375F-0D3E-4393-8EB0-2797962E039E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05D4608F-6C59-439C-BC1F-1FEF53A214B3",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_400_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "371A7925-FDCA-4158-853D-33F65FA4E9E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B837999B-AF15-4601-872B-43C3F129C814",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_850_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F67C4A13-50B5-45A9-A069-B7057EC5675B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA35390-F1B5-4F65-A907-3099515A548D",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B361ACB-0622-400A-8358-E6E239E23EAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DF9E880-20BA-45B6-8C61-8DF8972E87E3",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BA78DE-F2C5-4DEF-8768-3C88733B0C7C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBA900D-6A31-4328-9F84-E869FF7484D1",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2500_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95EE7175-23A1-4357-8E79-586D0D1C5068",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_10m_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E0D917-BB2C-49E8-9647-A1121CF98A73",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_10m_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89B0EC34-E6BA-4C9F-B79F-E510B21C6014",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "443BF261-461B-4204-9A5A-C212349856F2",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E4E2EF-5A50-4F1F-8A3B-C0B5BF9EBC98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA201B34-D644-4EDD-8804-C395144334B2",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7B49FF8-5DF9-495B-B29E-DCF92D376178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"id": "CVE-2022-38787",
"lastModified": "2024-11-21T07:17:05.220",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 5.2,
"source": "secure@intel.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-05-10T14:15:14.017",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "secure@intel.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…