Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-33945


Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.


Security Impact Summary

This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 8.2, requiring local system access to exploit with relatively low complexity without requiring user interaction . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 66 products from intel, from intel, from intel and 63 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2023, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2023-11-14T19:15:11.617

Last Modified

2024-11-21T07:08:39.500

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.2 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    NVD-CWE-noinfo
  • Type: Secondary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System intel server_board_m70klp2sb_firmware < 01.04.0022 Yes
Hardware intel server_board_m70klp2sb - No
Operating System intel server_system_m70klp4s2uhh_firmware < 01.04.0022 Yes
Hardware intel server_system_m70klp4s2uhh - No
Operating System intel server_board_m20ntp2sb_firmware < 0022.d02 Yes
Hardware intel server_board_m20ntp2sb - No
Operating System intel server_system_m20ntp1ur304_firmware < 0022.d02 Yes
Hardware intel server_system_m20ntp1ur304 - No
Operating System intel server_board_m10jnp2sb_firmware < 7.219 Yes
Hardware intel server_board_m10jnp2sb - No
Operating System intel server_board_s2600bpbr_firmware < 02.01.0015 Yes
Hardware intel server_board_s2600bpbr - No
Operating System intel server_board_s2600bps_firmware < 02.01.0015 Yes
Hardware intel server_board_s2600bps - No
Operating System intel server_board_s2600bpsr_firmware < 02.01.0015 Yes
Hardware intel server_board_s2600bpsr - No
Operating System intel server_board_s2600bpqr_firmware < 02.01.0015 Yes
Hardware intel server_board_s2600bpqr - No
Operating System intel server_board_s2600bpb_firmware < 02.01.0015 Yes
Hardware intel server_board_s2600bpb - No
Operating System intel server_board_s2600bpq_firmware < 02.01.0015 Yes
Hardware intel server_board_s2600bpq - No
Operating System intel compute_module_hns2600bpblcr_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpblcr - No
Operating System intel compute_module_hns2600bpblc_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpblc - No
Operating System intel compute_module_hns2600bpblc24r_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpblc24r - No
Operating System intel compute_module_hns2600bps_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bps - No
Operating System intel compute_module_hns2600bps24_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bps24 - No
Operating System intel compute_module_hns2600bpbr_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpbr - No
Operating System intel compute_module_hns2600bpqr_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpqr - No
Operating System intel compute_module_hns2600bpsr_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpsr - No
Operating System intel compute_module_hns2600bps24r_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bps24r - No
Operating System intel compute_module_hns2600bpq24r_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpq24r - No
Operating System intel compute_module_hns2600bpb24_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpb24 - No
Operating System intel compute_module_hns2600bpb_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpb - No
Operating System intel compute_module_hns2600bpblc24_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpblc24 - No
Operating System intel compute_module_hns2600bpq_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpq - No
Operating System intel compute_module_hns2600bpq24_firmware < 02.01.0015 Yes
Hardware intel compute_module_hns2600bpq24 - No
Operating System intel compute_module_liquid-cooled_hns2600bpbrct_firmware < 02.01.0015 Yes
Hardware intel compute_module_liquid-cooled_hns2600bpbrct - No
Operating System intel server_system_vrn2224bpaf6_firmware < 02.01.0015 Yes
Hardware intel server_system_vrn2224bpaf6 - No
Operating System intel server_system_vrn2224bphy6_firmware < 02.01.0015 Yes
Hardware intel server_system_vrn2224bphy6 - No
Operating System intel server_system_mcb2208wfaf5_firmware < 02.01.0015 Yes
Hardware intel server_system_mcb2208wfaf5 - No
Operating System intel server_system_zsb2224bpaf2_firmware < 02.01.0015 Yes
Hardware intel server_system_zsb2224bpaf2 - No
Operating System intel server_system_zsb2224bphy1_firmware < 02.01.0015 Yes
Hardware intel server_system_zsb2224bphy1 - No
Operating System intel server_system_zsb2224bpaf1_firmware < 02.01.0015 Yes
Hardware intel server_system_zsb2224bpaf1 - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For intel's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.