7.8
CVE-2022-41628
- EPSS 0.07%
- Published 10.05.2023 14:15:17
- Last modified 21.11.2024 07:23:31
- Source secure@intel.com
- Teams watchlist Login
- Open Login
Uncontrolled search path element in the HotKey Services for some Intel(R) NUC P14E Laptop Element software for Windows 10 before version 1.1.44 may allow an authenticated user to potentially enable escalation of privilege via local access.
Data is provided by the National Vulnerability Database (NVD)
Intel ≫ Nuc P14e Laptop Element Version < 1.1.44
Microsoft ≫ Windows 10 1507 Version-
Microsoft ≫ Windows 10 1511 Version-
Microsoft ≫ Windows 10 1607 Version-
Microsoft ≫ Windows 10 1703 Version-
Microsoft ≫ Windows 10 1709 Version-
Microsoft ≫ Windows 10 1803 Version-
Microsoft ≫ Windows 10 1809 Version-
Microsoft ≫ Windows 10 1903 Version-
Microsoft ≫ Windows 10 1909 Version-
Microsoft ≫ Windows 10 2004 Version-
Microsoft ≫ Windows 10 20h2 Version-
Microsoft ≫ Windows 10 21h1 Version-
Microsoft ≫ Windows 10 21h2 Version-
Microsoft ≫ Windows 10 22h2 Version-
Microsoft ≫ Windows 10 1511 Version-
Microsoft ≫ Windows 10 1607 Version-
Microsoft ≫ Windows 10 1703 Version-
Microsoft ≫ Windows 10 1709 Version-
Microsoft ≫ Windows 10 1803 Version-
Microsoft ≫ Windows 10 1809 Version-
Microsoft ≫ Windows 10 1903 Version-
Microsoft ≫ Windows 10 1909 Version-
Microsoft ≫ Windows 10 2004 Version-
Microsoft ≫ Windows 10 20h2 Version-
Microsoft ≫ Windows 10 21h1 Version-
Microsoft ≫ Windows 10 21h2 Version-
Microsoft ≫ Windows 10 22h2 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.185 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
secure@intel.com | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.