{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-36397","assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","state":"PUBLISHED","assignerShortName":"intel","dateReserved":"2022-08-02T03:00:25.710Z","datePublished":"2023-02-16T20:00:25.512Z","dateUpdated":"2025-01-27T18:14:03.479Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel","dateUpdated":"2023-02-16T20:00:25.512Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"escalation of privilege"}]}],"affected":[{"vendor":"n/a","product":"Intel(R) QAT drivers for Linux","versions":[{"version":"before version 4.17","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Incorrect default permissions in the software installer for some Intel(R) QAT drivers for Linux before version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access."}],"references":[{"name":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":7.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T10:00:04.311Z"},"title":"CVE Program Container","references":[{"name":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-27T17:29:15.588189Z","id":"CVE-2022-36397","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-27T18:14:03.479Z"}}]}}