VAR-202205-0782
Vulnerability from variot - Updated: 2025-05-07 20:55Improper input validation in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202205-0782",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nuc 11 pro kit nuc11tnki50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast mini pc nuc11phki7caa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 8 compute element cm8i7cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 compute element cm11ebi58w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnki3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70q",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast kit nuc11phki7c",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc71e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "lapbc710",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11dbbi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc11pah",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 8 compute element cm8ccb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc11paq",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc kit nuc8i7be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "lapbc510",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11pa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 11 pro board nuc11tnbi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9v7qnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 8 compute element cm8pcb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnki30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc kit nuc8i3b",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 pro kit nuc11tnhi70l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc51e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro kit nuc11tnhi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 9 pro kit nuc9v7qnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 compute element cm11ebi38w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro board nuc11tnbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i5cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnhi30p",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9vxqnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc8i3cysn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnhi30l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i7qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc9i5qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "lapkc71f",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc11dbbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 11 compute element cm11ebi716w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnhi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i9qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnki5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro kit nuc9vxqnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i3cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc kit nuc8i5be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 compute element cm11ebc4w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "lapbc710",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi716w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebc4w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pah",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pa",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71f",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11paq",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi38w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc51e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi58w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapbc510",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"cve": "CVE-2022-24382",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2022-24382",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2022-24382",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2022-24382",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-24382",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2022-24382",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2022-24382",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202205-3049",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper input validation in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "VULMON",
"id": "CVE-2022-24382"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-24382",
"trust": 3.3
},
{
"db": "JVN",
"id": "JVNVU93344744",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2022.2320",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-24382",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"id": "VAR-202205-0782",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.13392857
},
"last_update_date": "2025-05-07T20:55:52.841000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Intel NUC Enter the fix for the verification error vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193793"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.0
},
{
"problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93344744/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-24382"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.2320"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-24382/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"date": "2023-08-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"date": "2022-05-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"date": "2022-05-12T17:15:10.267000",
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"date": "2023-08-07T08:15:00",
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"date": "2022-05-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"date": "2025-05-05T17:18:00.110000",
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation vulnerability in multiple Intel products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…