var-202205-0781
Vulnerability from variot

Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0781",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nuc 9 pro compute element nuc9v7qnb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qncflx70.0064"
      },
      {
        "model": "nuc kit nuc8i7be",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "becfl357.0089"
      },
      {
        "model": "nuc 11 pro kit nuc11tnki3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc8i3cysn",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cycnli35.86a.0050"
      },
      {
        "model": "nuc 11 compute element cm11ebi58w",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "ebtgl357.0057"
      },
      {
        "model": "nuc 11 pro kit nuc11tnki5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 compute element cm11ebi38w",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "ebtgl357.0057"
      },
      {
        "model": "lapbc510",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "bctgl357.0065"
      },
      {
        "model": "nuc11paq",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0042"
      },
      {
        "model": "nuc11pa",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0042"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi50z",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 compute element cm11ebi716w",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "ebtgl357.0057"
      },
      {
        "model": "nuc 11 pro board nuc11tnbi7",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi70l",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi70q",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 enthusiast mini pc nuc11phki7caa",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "phtgl579.0064"
      },
      {
        "model": "nuc 11 pro kit nuc11tnki70z",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc9i5qn",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qxcfl579.0064"
      },
      {
        "model": "nuc 11 pro board nuc11tnbi3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc11dbbi9",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "dbtgl579.0055"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi30l",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "lapbc710",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "bctgl357.0065"
      },
      {
        "model": "nuc 11 pro kit nuc11tnki7",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 8 compute element cm8i5cb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cbwhl.0095"
      },
      {
        "model": "nuc kit nuc8i3b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "becfl357.0089"
      },
      {
        "model": "nuc 11 pro board nuc11tnbi70z",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 8 compute element cm8pcb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cbwhl.0095"
      },
      {
        "model": "nuc 8 compute element cm8ccb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cbwhl.0095"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi7",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "lapkc51e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "kctgl357.0040"
      },
      {
        "model": "nuc11btmi9",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "dbtgl579.0055"
      },
      {
        "model": "nuc 11 pro kit nuc11tnki50z",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 enthusiast kit nuc11phki7c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "phtgl579.0064"
      },
      {
        "model": "nuc 8 compute element cm8i7cb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cbwhl.0095"
      },
      {
        "model": "nuc 8 compute element cm8i3cb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cbwhl.0095"
      },
      {
        "model": "nuc11pah",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "patgl357.0042"
      },
      {
        "model": "nuc9i7qn",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qxcfl579.0064"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi50w",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 pro board nuc11tnbi50z",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "lapkc71f",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "kctgl357.0040"
      },
      {
        "model": "nuc kit nuc8i5be",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "becfl357.0089"
      },
      {
        "model": "nuc 11 compute element cm11ebc4w",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "ebtgl357.0057"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi30z",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi70z",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 pro board nuc11tnbi5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 9 pro kit nuc9v7qnx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qncflx70.0064"
      },
      {
        "model": "nuc 11 pro kit nuc11tnki30z",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi30p",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc11dbbi7",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "dbtgl579.0055"
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi50l",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "lapkc71e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "kctgl357.0040"
      },
      {
        "model": "nuc 9 pro compute element nuc9vxqnb",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qncflx70.0064"
      },
      {
        "model": "nuc 11 pro board nuc11tnbi30z",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "tntgl357.0059"
      },
      {
        "model": "nuc8i3cysm",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "cycnli35.86a.0050"
      },
      {
        "model": "nuc 9 pro kit nuc9vxqnx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qncflx70.0064"
      },
      {
        "model": "nuc11btmi7",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "dbtgl579.0055"
      },
      {
        "model": "nuc9i9qn",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "qxcfl579.0064"
      },
      {
        "model": "lapbc710",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc11btmi9",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc 11 pro kit nuc11tnhi50z",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc 11 pro board nuc11tnbi30z",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "intel nuc 11 compute element cm11ebi716w",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "lapkc71e",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "intel nuc 11 compute element cm11ebc4w",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc11dbbi7",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc11pah",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc11pa",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "lapkc71f",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc11paq",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "intel nuc 11 compute element cm11ebi38w",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc 11 pro board nuc11tnbi70z",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc11btmi7",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "lapkc51e",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc11dbbi9",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "nuc 11 pro board nuc11tnbi50z",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "intel nuc 11 compute element cm11ebi58w",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "lapbc510",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-009663"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-24297"
      }
    ]
  },
  "cve": "CVE-2022-24297",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2022-24297",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.8,
            "id": "CVE-2022-24297",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2022-24297",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2022-24297",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2022-24297",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202205-3048",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-009663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202205-3048"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-24297"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-24297"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-009663"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-24297"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-24297",
        "trust": 3.3
      },
      {
        "db": "JVN",
        "id": "JVNVU93344744",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-009663",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.2320",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202205-3048",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-24297",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2022-24297"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-009663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202205-3048"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-24297"
      }
    ]
  },
  "id": "VAR-202205-0781",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.13392857
  },
  "last_update_date": "2024-11-23T20:33:11.762000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Intel NUC Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193792"
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202205-3048"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-009663"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-24297"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu93344744/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24297"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.2320"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-24297/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2022-24297"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-009663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202205-3048"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-24297"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2022-24297"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-009663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202205-3048"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-24297"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-05-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-24297"
      },
      {
        "date": "2023-08-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-009663"
      },
      {
        "date": "2022-05-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202205-3048"
      },
      {
        "date": "2022-05-12T17:15:10.223000",
        "db": "NVD",
        "id": "CVE-2022-24297"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-05-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-24297"
      },
      {
        "date": "2023-08-07T08:15:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-009663"
      },
      {
        "date": "2022-05-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202205-3048"
      },
      {
        "date": "2024-11-21T06:50:07.030000",
        "db": "NVD",
        "id": "CVE-2022-24297"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202205-3048"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vulnerabilities in multiple Intel products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-009663"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202205-3048"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.