Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-33894 CVE-2022-38087 |
CWE-ID | CWE-20 CWE-668 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
8th Generation Intel Core Processors Hardware solutions / Firmware Intel Xeon Processor E Family Hardware solutions / Firmware 7th Generation Intel Core Processors Hardware solutions / Firmware 10th Generation Intel Core Processors Hardware solutions / Firmware Intel Xeon Platinum P-8124 processors Hardware solutions / Firmware Intel Xeon Platinum P-8136 processors Hardware solutions / Firmware Intel Xeon D Processors Hardware solutions / Firmware Intel Xeon W Processors Hardware solutions / Firmware 9th Generation Intel Core Processors Client/Desktop applications / Web browsers Intel Xeon Scalable Processors Hardware solutions / Other hardware appliances |
Vendor | Intel |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU75930
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-33894
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient input validation in the BIOS firmware. A local user can execute arbitrary code with escalated privileges.
Install updates from vendor's website.
Vulnerable software versions8th Generation Intel Core Processors: All versions
9th Generation Intel Core Processors: All versions
Intel Xeon Processor E Family: All versions
7th Generation Intel Core Processors: All versions
10th Generation Intel Core Processors: All versions
CPE2.3http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75931
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-38087
CWE-ID:
CWE-668 - Exposure of resource to wrong sphere
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to exposure of resource to wrong sphere in BIOS firmware. A local user can gain access to sensitive information.
Install updates from vendor's website.
Vulnerable software versions8th Generation Intel Core Processors: All versions
10th Generation Intel Core Processors: All versions
7th Generation Intel Core Processors: All versions
Intel Xeon Processor E Family: All versions
Intel Xeon Scalable Processors: All versions
Intel Xeon Platinum P-8124 processors: All versions
Intel Xeon Platinum P-8136 processors: All versions
Intel Xeon D Processors: All versions
Intel Xeon W Processors: All versions
CPE2.3http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.