CVE-2022-35729

Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:openbmc-project:openbmc:*:*:*:*:*:*:*:*
OR cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c624a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:11

Type Values Removed Values Added
References () http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html - Vendor Advisory () http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html - Vendor Advisory

06 Mar 2023, 17:47

Type Values Removed Values Added
References (MISC) http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html - (MISC) http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-125
CPE cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*
cpe:2.3:a:openbmc-project:openbmc:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c624a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*

17 Feb 2023, 12:52

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-16 21:15

Updated : 2024-11-21 07:11


NVD link : CVE-2022-35729

Mitre link : CVE-2022-35729

CVE.ORG link : CVE-2022-35729


JSON object : View

Products Affected

intel

  • xeon_gold_6314u
  • xeon_gold_5320
  • xeon_platinum_8368
  • xeon_gold_6338n
  • c629a
  • xeon_gold_5318n
  • xeon_gold_6346
  • xeon_gold_6328h
  • xeon_gold_6312u
  • xeon_gold_5315y
  • xeon_platinum_8368q
  • xeon_platinum_8376h
  • xeon_platinum_8362
  • c624a
  • xeon_gold_5318s
  • xeon_platinum_8380h
  • xeon_gold_6334
  • xeon_platinum_8380hl
  • xeon_gold_6348
  • xeon_platinum_8356h
  • xeon_gold_5320t
  • xeon_platinum_8351n
  • xeon_gold_5317
  • xeon_gold_6330n
  • xeon_gold_6330
  • xeon_gold_6328hl
  • xeon_gold_6348h
  • xeon_gold_6338
  • xeon_platinum_8376hl
  • xeon_platinum_8353h
  • xeon_gold_5318h
  • xeon_gold_6330h
  • xeon_platinum_8358p
  • c627a
  • xeon_gold_6326
  • xeon_silver_4310
  • xeon_silver_4310t
  • xeon_platinum_8360h
  • xeon_gold_6338t
  • xeon_platinum_8358
  • xeon_platinum_8352m
  • xeon_silver_4314
  • xeon_platinum_8352s
  • xeon_silver_4316
  • xeon_gold_6342
  • xeon_platinum_8380
  • xeon_gold_6336y
  • xeon_gold_6354
  • xeon_platinum_8352v
  • xeon_platinum_8352y
  • xeon_platinum_8360y
  • xeon_gold_5318y
  • xeon_gold_5320h
  • xeon_silver_4309y
  • xeon_platinum_8354h
  • xeon_platinum_8360hl
  • c621a

openbmc-project

  • openbmc
CWE
CWE-125

Out-of-bounds Read