79 lines
2.2 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-26844",
"sourceIdentifier": "secure@intel.com",
"published": "2022-08-18T20:15:11.087",
"lastModified": "2022-08-22T13:12:04.377",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Insufficiently protected credentials in the installation binaries for Intel(R) SEAPI in all versions may allow an authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Unas credenciales insuficientemente protegidas en los binarios de instalaci\u00f3n para Intel(R) SEAPI en todas las versiones pueden permitir que un usuario autenticado permita potencialmente una escalada de privilegios por medio de acceso local."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:single_event_api:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3C612A2-DFBC-4592-80DF-3C8609E0B832"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00701.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}