Path transversal in some Intel(R) NUC Kits NUC7i3DN, NUC7i5DN, NUC7i7DN HDMI firmware update tool software before version 1.79.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | Patch Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
20 Nov 2023, 20:53
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-14 19:15
Updated : 2024-11-21 06:55
NVD link : CVE-2022-27229
Mitre link : CVE-2022-27229
CVE.ORG link : CVE-2022-27229
JSON object : View
Products Affected
intel
- nuc_7_business_nuc7i3dnhnc
- nuc_kit_nuc7i3dnke
- nuc_kit_nuc7i3dnhe
- nuc_kit_nuc7i5dnke
- nuc_kit_nuc7i7dnhe
- hdmi_firmware
- nuc_7_business_nuc7i3dnktc
- nuc_kit_nuc7i7dnke
- nuc_kit_nuc7i5dnhe
- nuc_7_business_nuc7i5dnkpu
- nuc_7_business_nuc7i5dnkpc