7.9
CVE-2022-42269
- EPSS 0.04%
- Published 30.12.2022 23:15:11
- Last modified 21.11.2024 07:24:37
- Source psirt@nvidia.com
- Teams watchlist Login
- Open Login
NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components.
Data is provided by the National Vulnerability Database (NVD)
Nvidia ≫ Jetson Linux Version < 32.7.2
Nvidia ≫ Jetson Agx Xavier Version-
Nvidia ≫ Jetson Agx Xavier 16gb Version-
Nvidia ≫ Jetson Agx Xavier 32gb Version-
Nvidia ≫ Jetson Agx Xavier 64gb Version-
Nvidia ≫ Jetson Agx Xavier 8gb Version-
Nvidia ≫ Jetson Agx Xavier Industrial Version-
Nvidia ≫ Jetson Tx1 Version-
Nvidia ≫ Jetson Tx2 Version-
Nvidia ≫ Jetson Tx2 4gb Version-
Nvidia ≫ Jetson Tx2 Nx Version-
Nvidia ≫ Jetson Tx2i Version-
Nvidia ≫ Jetson Xavier Nx Version-
Nvidia ≫ Jetson Xavier Nx 16gb Version-
Nvidia ≫ Jetson Agx Xavier 16gb Version-
Nvidia ≫ Jetson Agx Xavier 32gb Version-
Nvidia ≫ Jetson Agx Xavier 64gb Version-
Nvidia ≫ Jetson Agx Xavier 8gb Version-
Nvidia ≫ Jetson Agx Xavier Industrial Version-
Nvidia ≫ Jetson Tx1 Version-
Nvidia ≫ Jetson Tx2 Version-
Nvidia ≫ Jetson Tx2 4gb Version-
Nvidia ≫ Jetson Tx2 Nx Version-
Nvidia ≫ Jetson Tx2i Version-
Nvidia ≫ Jetson Xavier Nx Version-
Nvidia ≫ Jetson Xavier Nx 16gb Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.131 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.9 | 1.5 | 5.8 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
|
psirt@nvidia.com | 7.9 | 1.5 | 5.8 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.