Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-38087

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-10 May, 2023 | 13:17
Updated At-13 Feb, 2025 | 16:32
Rejected At-
Credits

Exposure of resource to wrong sphere in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:10 May, 2023 | 13:17
Updated At:13 Feb, 2025 | 16:32
Rejected At:
▼CVE Numbering Authority (CNA)

Exposure of resource to wrong sphere in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.

Affected Products
Vendor
n/a
Product
Intel(R) Processors
Default Status
unaffected
Versions
Affected
  • See references
Problem Types
TypeCWE IDDescription
N/AN/Ainformation disclosure
CWECWE-668Exposure of resource to wrong sphere
Type: N/A
CWE ID: N/A
Description: information disclosure
Type: CWE
CWE ID: CWE-668
Description: Exposure of resource to wrong sphere
Metrics
VersionBase scoreBase severityVector
3.14.1MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 4.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html
N/A
https://security.netapp.com/advisory/ntap-20231124-0006/
N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20231124-0006/
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html
x_transferred
https://security.netapp.com/advisory/ntap-20231124-0006/
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html
Resource:
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20231124-0006/
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:10 May, 2023 | 14:15
Updated At:24 Nov, 2023 | 09:15

Exposure of resource to wrong sphere in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Secondary3.14.1MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Intel Corporation
intel
>>xeon_e-2314_firmware>>-
cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2314>>-
cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2324g_firmware>>-
cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2324g>>-
cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2334_firmware>>-
cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2334>>-
cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2336_firmware>>-
cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2336>>-
cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2356g_firmware>>-
cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2356g>>-
cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2374g_firmware>>-
cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2374g>>-
cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2378_firmware>>-
cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2378>>-
cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2378g_firmware>>-
cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2378g>>-
cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2386g_firmware>>-
cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2386g>>-
cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2388g_firmware>>-
cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2388g>>-
cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2226ge_firmware>>-
cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2226ge>>-
cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2254me_firmware>>-
cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2254me>>-
cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2254ml_firmware>>-
cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2254ml>>-
cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2276me_firmware>>-
cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2276me>>-
cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2276ml_firmware>>-
cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2276ml>>-
cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2278ge_firmware>>-
cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2278ge>>-
cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2278gel_firmware>>-
cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2278gel>>-
cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2224_firmware>>-
cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2224>>-
cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2224g_firmware>>-
cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2224g>>-
cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2226g_firmware>>-
cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2226g>>-
cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2234_firmware>>-
cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2234>>-
cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2236_firmware>>-
cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2236>>-
cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2244g_firmware>>-
cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2244g>>-
cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2246g_firmware>>-
cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2246g>>-
cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2274g_firmware>>-
cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_e-2274g>>-
cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-668Primarynvd@nist.gov
CWE-668Secondarysecure@intel.com
CWE ID: CWE-668
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-668
Type: Secondary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security.netapp.com/advisory/ntap-20231124-0006/secure@intel.com
N/A
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.htmlsecure@intel.com
Vendor Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20231124-0006/
Source: secure@intel.com
Resource: N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

152Records found

CVE-2021-0588
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 6.29%
||
7 Day CHG~0.00%
Published-14 Jul, 2021 | 13:44
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In processInboundMessage of MceStateMachine.java, there is a possible SMS disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9Android ID: A-177238342

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-1438
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 13.37%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 12:40
Updated-08 Nov, 2024 | 23:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Wide Area Application Services Software Information Disclosure Vulnerability

A vulnerability in Cisco Wide Area Application Services (WAAS) Software could allow an authenticated, local attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper input validation and authorization of specific commands that a user can execute within the CLI. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to read arbitrary files that they originally did not have permissions to access.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-wide_area_application_servicesCisco Wide Area Application Services (WAAS)
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found