Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-21216 |
CWE-ID | CWE-284 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
3rd Generation Intel Xeon Scalable Processors Hardware solutions / Firmware Intel Atom Processor P5900 Hardware solutions / Firmware Intel Atom Processor P5300 Hardware solutions / Firmware Intel Atom Processor C5300 Hardware solutions / Firmware |
Vendor | Intel |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU72448
Risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21216
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in out-of-band management in Intel processors. A remote privileged user on the local network can bypass implemented security restrictions and gain unauthorized access to the application.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Xeon Scalable Processors: All versions
Intel Atom Processor P5900: All versions
Intel Atom Processor P5300: All versions
Intel Atom Processor C5300: All versions
External linkshttp://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.