cvelist/2022/42xxx/CVE-2022-42278.json

88 lines
2.9 KiB
JSON
Raw Normal View History

2022-10-03 15:00:33 +00:00
{
2023-01-13 02:01:31 +00:00
"data_version": "4.0",
2022-10-03 15:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-42278",
2023-01-13 02:01:31 +00:00
"ASSIGNER": "psirt@nvidia.com",
"STATE": "PUBLIC"
2022-10-03 15:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-01-13 02:01:31 +00:00
"value": "NVIDIA BMC contains a vulnerability in SPX REST API, where an authorized attacker can read and write to arbitrary locations within the memory context of the IPMI server process, which may lead to code execution, denial of service, information disclosure and data tampering."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "NVIDIA",
"product": {
"product_data": [
{
"product_name": "NVIDIA DGX servers",
"version": {
"version_data": [
{
"version_value": "All BMC firmware versions prior to 00.19.07",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5435",
"refsource": "MISC",
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2022-10-03 15:00:33 +00:00
}
]
}
}