2021-11-12 03:00:57 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ID" : "CVE-2022-21203" ,
2022-02-09 23:01:32 +00:00
"ASSIGNER" : "secure@intel.com" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "n/a" ,
"product" : {
"product_data" : [
{
"product_name" : "Intel(R) Quartus(R) Prime Standard Edition" ,
"version" : {
"version_data" : [
{
"version_value" : "before version 21.1"
}
]
}
}
]
}
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : " escalation of privilege "
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00632.html" ,
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00632.html"
}
]
2021-11-12 03:00:57 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2022-02-09 23:01:32 +00:00
"value" : "Improper permissions in the SafeNet Sentinel driver for Intel(R) Quartus(R) Prime Standard Edition before version 21.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
2021-11-12 03:00:57 +00:00
}
]
}
}