Vulnerability Details : CVE-2022-33196
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
Products affected by CVE-2022-33196
- cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6342_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6346_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8360y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6354_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6314u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6338n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6334_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_silver_4309y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6348_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5318s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6312u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5320_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5315y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8352m_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8362_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8368_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8358_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8352y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6338_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6330n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8380_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8351n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8368q_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8352s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8358p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8352v_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2745nx_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2757nx_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2777nx_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_d-2798nx_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-33196
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-33196
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.7
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N |
0.8
|
5.8
|
Intel Corporation |
CWE ids for CVE-2022-33196
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-33196
-
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
INTEL-SA-00738Vendor Advisory
Jump to