cvelist/2022/34xxx/CVE-2022-34157.json

81 lines
2.7 KiB
JSON
Raw Normal View History

2022-06-27 03:00:50 +00:00
{
2023-02-16 20:00:50 +00:00
"data_version": "4.0",
2022-06-27 03:00:50 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-34157",
2023-02-16 20:00:50 +00:00
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
2022-06-27 03:00:50 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-02-16 20:00:50 +00:00
"value": "Improper access control in the Intel(R) FPGA SDK for OpenCL(TM) with Intel(R) Quartus(R) Prime Pro Edition software before version 22.1 may allow authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Intel(R) FPGA SDK for OpenCL(TM) with Intel(R) Quartus(R) Prime Pro Edition software",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before version 22.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00728.html",
"refsource": "MISC",
"name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00728.html"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
2022-06-27 03:00:50 +00:00
}
]
}
}