Improper input validation for some Intel(R) BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html | Patch Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
Information
Published : 2023-05-10 14:15
Updated : 2024-11-21 07:06
NVD link : CVE-2022-32766
Mitre link : CVE-2022-32766
CVE.ORG link : CVE-2022-32766
JSON object : View
Products Affected
intel
- compute_stick_stk2mv64cc_firmware
- compute_stick_stk2mv64cc
CWE