{"containers":{"cna":{"affected":[{"product":"Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT","vendor":"n/a","versions":[{"status":"affected","version":"See references"}]}],"descriptions":[{"lang":"en","value":"Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enable escalation of privilege via physical access."}],"problemTypes":[{"descriptions":[{"description":"escalation of privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-05-12T16:36:02.000Z","orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00613.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","ID":"CVE-2022-0004","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT","version":{"version_data":[{"version_value":"See references"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enable escalation of privilege via physical access."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"escalation of privilege"}]}]},"references":{"reference_data":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00613.html","refsource":"MISC","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00613.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:18:41.376Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00613.html"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-noinfo Not enough information"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.8,"attackVector":"PHYSICAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T13:30:30.438968Z","id":"CVE-2022-0004","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-05T16:44:05.603Z"}}]},"cveMetadata":{"assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","assignerShortName":"intel","cveId":"CVE-2022-0004","datePublished":"2022-05-12T16:36:02.000Z","dateReserved":"2021-10-15T00:00:00.000Z","dateUpdated":"2025-05-05T16:44:05.603Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}