SB2023030807 - Multiple vulnerabilities in Intel System Usage Report (SUR)
Published: March 8, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2022-29514)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain elevated privileges on the system.
2) Input validation error (CVE-ID: CVE-2022-33964)
The vulnerability allows a remote attacker to escalate privileges.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and gain elevated privileges on the target system.
3) Input validation error (CVE-ID: CVE-2022-33190)
The vulnerability allows a local user to escalate privileges.
The vulnerability exists due to insufficient validation of user-supplied input. A local user can pass specially crafted input to the application and gain elevated privileges on the target system.
4) Improper access control (CVE-ID: CVE-2022-34854)
The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A local user can bypass implemented security restrictions and gain elevated privileges on the system.
5) Improper Check for Unusual or Exceptional Conditions (CVE-ID: CVE-2022-30692)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling. A remote attacker can send specially crafted data to the application and perform a denial of service (DoS) attack.
6) Improper Authentication (CVE-ID: CVE-2022-33946)
The vulnerability allows a local user to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests. A local user can bypass authentication process and gain elevated privileges on the system.
7) Improper access control (CVE-ID: CVE-2022-31476)
The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A local user can bypass implemented security restrictions and perform a denial of service (DoS) attack.
8) Improper Authentication (CVE-ID: CVE-2022-32971)
The vulnerability allows a remote user to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests. A remote administrator can bypass authentication process and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.