Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:intel:administrative_tools_for_intel_network_adapters:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCACAA3E-0515-4A2E-BD94-57B549640878", "versionEndExcluding": "27.3", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:intel:non-volatile_memory_update_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E312868-99F3-488E-B03F-A9291D93798A", "versionEndExcluding": "4.01", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intel:ethernet_controller_e810:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAAF14CD-89F6-49F3-8E74-3EE0535D8513", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1:-:*:*:*:*:*:*:*", "matchCriteriaId": "87F3AB90-46C3-48DD-B0B4-4E036712ECCB", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1_for_ocp:-:*:*:*:*:*:*:*", "matchCriteriaId": "86F81244-F28E-416A-B3B6-7A1F79D8AC73", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1_for_ocp_3.0:-:*:*:*:*:*:*:*", "matchCriteriaId": "F06D5B95-4DD0-4BEB-A32A-AAE300046670", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda2:-:*:*:*:*:*:*:*", "matchCriteriaId": "D582770B-4CCD-43A4-B218-FFD9AE530A24", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda2_for_ocp_3.0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA63976A-922C-4E50-8D69-D7F6A62AD31E", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E006D87-BC0F-485E-931D-789221B9D876", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda2_for_ocp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D255A8A-BB76-4F8E-9E44-3F391AA16CE3", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda2_for_ocp_3.0:-:*:*:*:*:*:*:*", "matchCriteriaId": "31F0C290-6882-49EB-B89A-9CFCC1A4BEEA", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda4:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA0F1118-C181-42B4-B3C4-A5AE9F59654E", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD53D7BD-4119-4221-8A83-1268F3CA715E", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810-cam1:-:*:*:*:*:*:*:*", "matchCriteriaId": "839854C2-8442-4EB8-8FE0-434FEAD3B559", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810-cam2:-:*:*:*:*:*:*:*", "matchCriteriaId": "42E8F0FF-94C1-4AB5-A9D3-D2963A2200F3", "vulnerable": false}, {"criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810-xxvam2:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFC7B304-7705-40F7-A357-5F7E8FD71E47", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Uncontrolled search path in some Intel(R) Network Adapter installer software may allow an authenticated user to potentially enable escalation of privilege via local access."}], "id": "CVE-2022-41314", "lastModified": "2024-11-21T07:23:01.657", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "secure@intel.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-02-16T21:15:13.823", "references": [{"source": "secure@intel.com", "tags": ["Vendor Advisory"], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html"}], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-427"}], "source": "nvd@nist.gov", "type": "Primary"}]}