{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-36392","assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","state":"PUBLISHED","assignerShortName":"intel","dateReserved":"2022-07-24T03:00:08.597Z","datePublished":"2023-08-11T02:36:55.653Z","dateUpdated":"2025-02-13T16:32:48.992Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel","dateUpdated":"2023-08-24T18:06:15.943Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"denial of service"},{"lang":"en","description":"Improper input validation","cweId":"CWE-20","type":"CWE"}]}],"affected":[{"vendor":"n/a","product":"Intel(R) AMT and Intel(R) Standard Manageability in Intel (R) CSME","versions":[{"version":"before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Improper input validation in some firmware for Intel(R) AMT and Intel(R) Standard Manageability before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27 in Intel (R) CSME may allow an unauthenticated user to potentially enable denial of service via network access."}],"references":[{"name":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"},{"url":"https://security.netapp.com/advisory/ntap-20230824-0002/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":8.6,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T10:00:04.315Z"},"title":"CVE Program Container","references":[{"name":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20230824-0002/","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-116","lang":"en","description":"CWE-116 Improper Encoding or Escaping of Output"}]}],"affected":[{"vendor":"intel_and_intel_standard_manageability_in_intel_csme","product":"intel_and_intel_standard_manageability_in_intel_csme","cpes":["cpe:2.3:a:intel_and_intel_standard_manageability_in_intel_csme:intel_and_intel_standard_manageability_in_intel_csme:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"11.8.94","versionType":"custom"},{"version":"0","status":"affected","lessThan":"11.12.94","versionType":"custom"},{"version":"0","status":"affected","lessThan":"11.22.94","versionType":"custom"},{"version":"0","status":"affected","lessThan":"12.0.93","versionType":"custom"},{"version":"0","status":"affected","lessThan":"14.1.70","versionType":"custom"},{"version":"0","status":"affected","lessThan":"15.0.45","versionType":"custom"},{"version":"0","status":"affected","lessThan":"16.1.27","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-17T14:10:42.676462Z","id":"CVE-2022-36392","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-17T14:16:02.976Z"}}]}}