Search criteria
3 vulnerabilities found for lapkc71e by intel
VAR-202205-0780
Vulnerability from variot - Updated: 2025-05-07 21:17Improper buffer access in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202205-0780",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nuc 11 pro kit nuc11tnki50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast mini pc nuc11phki7caa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 8 compute element cm8i7cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 compute element cm11ebi58w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnki3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70q",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast kit nuc11phki7c",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc71e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "lapbc710",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11dbbi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc11pah",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 8 compute element cm8ccb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc11paq",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc kit nuc8i7be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "lapbc510",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11pa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 11 pro board nuc11tnbi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9v7qnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 8 compute element cm8pcb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnki30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc kit nuc8i3b",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 pro kit nuc11tnhi70l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc51e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro kit nuc11tnhi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 9 pro kit nuc9v7qnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 compute element cm11ebi38w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro board nuc11tnbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i5cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnhi30p",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9vxqnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc8i3cysn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnhi30l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i7qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc9i5qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "lapkc71f",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc11dbbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 11 compute element cm11ebi716w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnhi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i9qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnki5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro kit nuc9vxqnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i3cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc kit nuc8i5be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 compute element cm11ebc4w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "lapbc710",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi716w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebc4w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pah",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pa",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71f",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11paq",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi38w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc51e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi58w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapbc510",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"cve": "CVE-2022-21237",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2022-21237",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2022-21237",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2022-21237",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-21237",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2022-21237",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2022-21237",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202205-3047",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2022-21237",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper buffer access in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-21237"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "VULMON",
"id": "CVE-2022-21237"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-21237",
"trust": 3.3
},
{
"db": "JVN",
"id": "JVNVU93344744",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2022.2320",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-21237",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"id": "VAR-202205-0780",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.13392857
},
"last_update_date": "2025-05-07T21:17:37.437000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Intel NUC Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193791"
},
{
"title": "CVE-2022-XXXX",
"trust": 0.1,
"url": "https://github.com/AlphabugX/CVE-2022-23305 "
},
{
"title": "CVE-2022-XXXX",
"trust": 0.1,
"url": "https://github.com/AlphabugX/CVE-2022-RCE "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.0
},
{
"problemtype": "Buffer error (CWE-119) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93344744/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21237"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.2320"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-21237/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/119.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/alphabugx/cve-2022-23305"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"date": "2023-08-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"date": "2022-05-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"date": "2022-05-12T17:15:10.030000",
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-23T00:00:00",
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"date": "2023-08-07T08:15:00",
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"date": "2022-05-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"date": "2025-05-05T17:17:46.490000",
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer Error Vulnerability in Multiple Intel Products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
}
],
"trust": 0.6
}
}
VAR-202205-0782
Vulnerability from variot - Updated: 2025-05-07 20:55Improper input validation in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202205-0782",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nuc 11 pro kit nuc11tnki50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast mini pc nuc11phki7caa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 8 compute element cm8i7cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 compute element cm11ebi58w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnki3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70q",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast kit nuc11phki7c",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc71e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "lapbc710",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11dbbi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc11pah",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 8 compute element cm8ccb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc11paq",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc kit nuc8i7be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "lapbc510",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11pa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 11 pro board nuc11tnbi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9v7qnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 8 compute element cm8pcb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnki30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc kit nuc8i3b",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 pro kit nuc11tnhi70l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc51e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro kit nuc11tnhi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 9 pro kit nuc9v7qnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 compute element cm11ebi38w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro board nuc11tnbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i5cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnhi30p",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9vxqnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc8i3cysn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnhi30l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i7qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc9i5qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "lapkc71f",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc11dbbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 11 compute element cm11ebi716w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnhi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i9qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnki5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro kit nuc9vxqnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i3cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc kit nuc8i5be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 compute element cm11ebc4w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "lapbc710",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi716w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebc4w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pah",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pa",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71f",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11paq",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi38w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc51e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi58w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapbc510",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"cve": "CVE-2022-24382",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2022-24382",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2022-24382",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2022-24382",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-24382",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2022-24382",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2022-24382",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202205-3049",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper input validation in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "VULMON",
"id": "CVE-2022-24382"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-24382",
"trust": 3.3
},
{
"db": "JVN",
"id": "JVNVU93344744",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2022.2320",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-24382",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"id": "VAR-202205-0782",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.13392857
},
"last_update_date": "2025-05-07T20:55:52.841000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Intel NUC Enter the fix for the verification error vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193793"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.0
},
{
"problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93344744/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-24382"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.2320"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-24382/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"date": "2023-08-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"date": "2022-05-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"date": "2022-05-12T17:15:10.267000",
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"date": "2023-08-07T08:15:00",
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"date": "2022-05-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"date": "2025-05-05T17:18:00.110000",
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation vulnerability in multiple Intel products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
}
],
"trust": 0.6
}
}
VAR-202205-0781
Vulnerability from variot - Updated: 2025-05-07 20:16Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202205-0781",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nuc 11 pro kit nuc11tnki50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast mini pc nuc11phki7caa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 8 compute element cm8i7cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 compute element cm11ebi58w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnki3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70q",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast kit nuc11phki7c",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc71e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "lapbc710",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11dbbi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc11pah",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 8 compute element cm8ccb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc11paq",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc kit nuc8i7be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "lapbc510",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11pa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 11 pro board nuc11tnbi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9v7qnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 8 compute element cm8pcb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnki30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc kit nuc8i3b",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 pro kit nuc11tnhi70l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc51e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro kit nuc11tnhi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 9 pro kit nuc9v7qnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 compute element cm11ebi38w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro board nuc11tnbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i5cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnhi30p",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9vxqnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc8i3cysn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnhi30l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i7qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc9i5qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "lapkc71f",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc11dbbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 11 compute element cm11ebi716w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnhi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i9qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnki5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro kit nuc9vxqnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i3cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc kit nuc8i5be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 compute element cm11ebc4w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "lapbc710",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi716w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebc4w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pah",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pa",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71f",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11paq",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi38w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc51e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi58w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapbc510",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"cve": "CVE-2022-24297",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2022-24297",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2022-24297",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2022-24297",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-24297",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2022-24297",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2022-24297",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202205-3048",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-24297"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "VULMON",
"id": "CVE-2022-24297"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-24297",
"trust": 3.3
},
{
"db": "JVN",
"id": "JVNVU93344744",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009663",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2022.2320",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3048",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-24297",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-24297"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"id": "VAR-202205-0781",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.13392857
},
"last_update_date": "2025-05-07T20:16:26.852000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Intel NUC Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193792"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93344744/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-24297"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.2320"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-24297/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-24297"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2022-24297"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24297"
},
{
"date": "2023-08-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"date": "2022-05-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"date": "2022-05-12T17:15:10.223000",
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24297"
},
{
"date": "2023-08-07T08:15:00",
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"date": "2022-05-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"date": "2025-05-05T17:17:59.650000",
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Vulnerabilities in multiple Intel products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
}
],
"trust": 0.6
}
}