Improper input validation in firmware for Intel(R) NUC 8 Compute Element, Intel(R) NUC 11 Compute Element, Intel(R) NUC 12 Compute Element may allow a privileged user to enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html | Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
History
21 Nov 2024, 07:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
22 May 2023, 14:19
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html - Vendor Advisory | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:h:intel:elm12hbi5:-:*:*:*:*:*:*:* cpe:2.3:h:intel:cm11ebi58w:-:*:*:*:*:*:*:* cpe:2.3:h:intel:cm8i3cb4n:-:*:*:*:*:*:*:* cpe:2.3:o:intel:cm11ebi58w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:elm12hbi3_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:cm8ccb4r_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:cm11ebc4w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:cm8pcb4r_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:cm8i5cb8n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:cm8pcb4r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:cm8i7cb8n:-:*:*:*:*:*:*:* cpe:2.3:o:intel:elm12hbi5_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:elm12hbc_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:cm8i7cb8n_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:elm12hbi7_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:cm11ebi38w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:cm8ccb4r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:elm12hbi7:-:*:*:*:*:*:*:* cpe:2.3:o:intel:cm8i3cb4n_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:cm8i5cb8n_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:cm11ebc4w:-:*:*:*:*:*:*:* cpe:2.3:h:intel:elm12hbc:-:*:*:*:*:*:*:* cpe:2.3:o:intel:cm11ebi716w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:cm11ebi38w:-:*:*:*:*:*:*:* cpe:2.3:h:intel:cm11ebi716w:-:*:*:*:*:*:*:* cpe:2.3:h:intel:elm12hbi3:-:*:*:*:*:*:*:* |
10 May 2023, 14:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-10 14:15
Updated : 2024-11-21 07:12
NVD link : CVE-2022-36339
Mitre link : CVE-2022-36339
CVE.ORG link : CVE-2022-36339
JSON object : View
Products Affected
intel
- elm12hbc
- cm8pcb4r_firmware
- cm11ebi716w
- cm11ebi58w_firmware
- elm12hbi3
- elm12hbi5
- cm8pcb4r
- cm11ebc4w
- cm8ccb4r_firmware
- elm12hbi3_firmware
- cm8i5cb8n_firmware
- cm8i3cb4n_firmware
- cm11ebi58w
- elm12hbc_firmware
- cm8i7cb8n
- elm12hbi5_firmware
- elm12hbi7
- cm8ccb4r
- cm11ebi716w_firmware
- cm11ebc4w_firmware
- elm12hbi7_firmware
- cm8i7cb8n_firmware
- cm11ebi38w_firmware
- cm11ebi38w
- cm8i5cb8n
- cm8i3cb4n
CWE