CVE-2022-27229
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
14/11/2023
Last modified:
20/11/2023
Description
Path transversal in some Intel(R) NUC Kits NUC7i3DN, NUC7i5DN, NUC7i7DN HDMI firmware update tool software before version 1.79.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:intel:hdmi_firmware:*:*:*:*:*:*:*:* | 1.79.1.1 (excluding) | |
| cpe:2.3:h:intel:nuc_7_business_nuc7i3dnhnc:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:nuc_7_business_nuc7i3dnktc:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:nuc_7_business_nuc7i5dnkpc:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:nuc_7_business_nuc7i5dnkpu:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:nuc_kit_nuc7i3dnke:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:nuc_kit_nuc7i5dnhe:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:nuc_kit_nuc7i5dnke:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:nuc_kit_nuc7i7dnhe:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:nuc_kit_nuc7i7dnke:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



