René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

103 lines
2.9 KiB
JSON

{
"id": "CVE-2022-36397",
"sourceIdentifier": "secure@intel.com",
"published": "2023-02-16T21:15:13.417",
"lastModified": "2023-03-06T19:43:03.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in the software installer for some Intel(R) QAT drivers for Linux before version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.6",
"matchCriteriaId": "854B9C59-48AD-4162-976F-2CFDAA14C9B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:linux:*:*",
"versionEndExcluding": "4.17",
"matchCriteriaId": "CE422E4F-1D5A-4605-92AC-4DEEAFA27A6D"
}
]
}
]
}
],
"references": [
{
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html",
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}