{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-38101","assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","state":"PUBLISHED","assignerShortName":"intel","dateReserved":"2022-09-29T03:00:04.966Z","datePublished":"2023-05-10T13:17:19.808Z","dateUpdated":"2025-01-24T17:44:11.775Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel","dateUpdated":"2023-05-10T13:17:19.808Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"escalation of privilege"},{"lang":"en","description":"Uncontrolled search path","cweId":"CWE-427","type":"CWE"}]}],"affected":[{"vendor":"n/a","product":"Intel(R) NUC Chaco Canyon BIOS update software","versions":[{"version":"before version iFlashV Windows 5.13.00.2105","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Uncontrolled search path in some Intel(R) NUC Chaco Canyon BIOS update software before version iFlashV Windows 5.13.00.2105 may allow an authenticated user to potentially enable escalation of privilege via local access."}],"references":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":6.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T10:45:52.594Z"},"title":"CVE Program Container","references":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-24T17:44:00.607449Z","id":"CVE-2022-38101","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-24T17:44:11.775Z"}}]}}