cvelist/2022/36xxx/CVE-2022-36397.json

81 lines
2.6 KiB
JSON
Raw Normal View History

2022-08-02 04:00:44 +00:00
{
2023-02-16 21:00:50 +00:00
"data_version": "4.0",
2022-08-02 04:00:44 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-36397",
2023-02-16 21:00:50 +00:00
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
2022-08-02 04:00:44 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-02-16 21:00:50 +00:00
"value": "Incorrect default permissions in the software installer for some Intel(R) QAT drivers for Linux before version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Intel(R) QAT drivers for Linux",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before version 4.17"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html",
"refsource": "MISC",
"name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
2022-08-02 04:00:44 +00:00
}
]
}
}