{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Intel MC versions ant\u00e9rieures \u00e0 2.3.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel EMA versions ant\u00e9rieures \u00e0 1.7.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Quartus Prime Pro edition software versions ant\u00e9rieures \u00e0 22.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel CSME versions ant\u00e9rieures \u00e0 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel PROSet/Wireless WiFi UEFI drivers versions ant\u00e9rieures \u00e0 2.2.14.22176","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.01.04.700.0, SPS_E3_06.00.03.035.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SDP Tool versions ant\u00e9rieures \u00e0 3.0.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN et NUC7i7DN versions ant\u00e9rieures \u00e0 1.78.2.0.7.","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Advanced Link Analyzer Pro versions ant\u00e9rieures \u00e0 22.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"PresentMon versions ant\u00e9rieures \u00e0 1.7.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC Kit Wireless Adapter driver installer software versions ant\u00e9rieures \u00e0 22.40.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SGX SDK software pour Linux versions ant\u00e9rieures \u00e0 2.18.100.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Glorp gaming particle physics demonstration software version 1.0.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Les produits Intel vPRO CSME WiFi sans la derni\u00e8re mise \u00e0 jour","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Advanced Link Analyzer Standrad versions ant\u00e9rieures \u00e0 22.1.1 STD","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel XMM 7560 Modem M.2 sans la derni\u00e8re mise \u00e0 jour","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server System R1000WF, R200WF et Intel Server Board S2600WF sans la derni\u00e8re mise \u00e0 jour","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel EMA versions ant\u00e9rieures \u00e0 1.8.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Board M50CYP sans la derni\u00e8re mise \u00e0 jour","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel PROSet/Wireless WiFi versions ant\u00e9rieures \u00e0 22.140","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Processors sans la derni\u00e8re mise \u00e0 jour","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel VTune Profiler software versions ant\u00e9rieures \u00e0 2022.2.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC BIOS Firmware sans la derni\u00e8re mise \u00e0 jour","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Quartus Prime Standard edition software versions ant\u00e9rieures \u00e0 21.1 Patch 0.02std","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Board M10JNP sans la derni\u00e8re mise \u00e0 jour","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel AMT versions ant\u00e9rieures \u00e0 11.8.93, 11.22.93, 12.0.92, 14.1.67, 15.0.42, 16.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Killer WiFi versions ant\u00e9rieures \u00e0 3.1122.3158","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Distribution of OpenVINO Toolkit versions ant\u00e9rieures \u00e0 2021.4.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SGX SDK software pour Windows versions ant\u00e9rieures \u00e0 2.17.100.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel AMT SDK versions ant\u00e9rieures \u00e0 16.0.4.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Hyperscan library versions ant\u00e9rieures \u00e0 5.4.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel System Studio toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel WAPI Security sans la derni\u00e8re mise \u00e0 jour","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel DCM versions ant\u00e9rieures \u00e0 5.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Support Android application versions ant\u00e9rieures \u00e0 22.02.28","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-27233","url":"https://www.cve.org/CVERecord?id=CVE-2022-27233"},{"name":"CVE-2022-27874","url":"https://www.cve.org/CVERecord?id=CVE-2022-27874"},{"name":"CVE-2022-36789","url":"https://www.cve.org/CVERecord?id=CVE-2022-36789"},{"name":"CVE-2022-36380","url":"https://www.cve.org/CVERecord?id=CVE-2022-36380"},{"name":"CVE-2022-33942","url":"https://www.cve.org/CVERecord?id=CVE-2022-33942"},{"name":"CVE-2022-37334","url":"https://www.cve.org/CVERecord?id=CVE-2022-37334"},{"name":"CVE-2022-36349","url":"https://www.cve.org/CVERecord?id=CVE-2022-36349"},{"name":"CVE-2022-38099","url":"https://www.cve.org/CVERecord?id=CVE-2022-38099"},{"name":"CVE-2022-27187","url":"https://www.cve.org/CVERecord?id=CVE-2022-27187"},{"name":"CVE-2022-30548","url":"https://www.cve.org/CVERecord?id=CVE-2022-30548"},{"name":"CVE-2022-26513","url":"https://www.cve.org/CVERecord?id=CVE-2022-26513"},{"name":"CVE-2022-27497","url":"https://www.cve.org/CVERecord?id=CVE-2022-27497"},{"name":"CVE-2021-0185","url":"https://www.cve.org/CVERecord?id=CVE-2021-0185"},{"name":"CVE-2021-33064","url":"https://www.cve.org/CVERecord?id=CVE-2021-33064"},{"name":"CVE-2022-21198","url":"https://www.cve.org/CVERecord?id=CVE-2022-21198"},{"name":"CVE-2022-30691","url":"https://www.cve.org/CVERecord?id=CVE-2022-30691"},{"name":"CVE-2022-36384","url":"https://www.cve.org/CVERecord?id=CVE-2022-36384"},{"name":"CVE-2022-26028","url":"https://www.cve.org/CVERecord?id=CVE-2022-26028"},{"name":"CVE-2022-32569","url":"https://www.cve.org/CVERecord?id=CVE-2022-32569"},{"name":"CVE-2022-25917","url":"https://www.cve.org/CVERecord?id=CVE-2022-25917"},{"name":"CVE-2022-26086","url":"https://www.cve.org/CVERecord?id=CVE-2022-26086"},{"name":"CVE-2022-28126","url":"https://www.cve.org/CVERecord?id=CVE-2022-28126"},{"name":"CVE-2022-34152","url":"https://www.cve.org/CVERecord?id=CVE-2022-34152"},{"name":"CVE-2022-26341","url":"https://www.cve.org/CVERecord?id=CVE-2022-26341"},{"name":"CVE-2022-26367","url":"https://www.cve.org/CVERecord?id=CVE-2022-26367"},{"name":"CVE-2022-26006","url":"https://www.cve.org/CVERecord?id=CVE-2022-26006"},{"name":"CVE-2022-21794","url":"https://www.cve.org/CVERecord?id=CVE-2022-21794"},{"name":"CVE-2022-26508","url":"https://www.cve.org/CVERecord?id=CVE-2022-26508"},{"name":"CVE-2022-33176","url":"https://www.cve.org/CVERecord?id=CVE-2022-33176"},{"name":"CVE-2022-26369","url":"https://www.cve.org/CVERecord?id=CVE-2022-26369"},{"name":"CVE-2022-33973","url":"https://www.cve.org/CVERecord?id=CVE-2022-33973"},{"name":"CVE-2022-26845","url":"https://www.cve.org/CVERecord?id=CVE-2022-26845"},{"name":"CVE-2021-33164","url":"https://www.cve.org/CVERecord?id=CVE-2021-33164"},{"name":"CVE-2021-33159","url":"https://www.cve.org/CVERecord?id=CVE-2021-33159"},{"name":"CVE-2022-37345","url":"https://www.cve.org/CVERecord?id=CVE-2022-37345"},{"name":"CVE-2022-27638","url":"https://www.cve.org/CVERecord?id=CVE-2022-27638"},{"name":"CVE-2022-36367","url":"https://www.cve.org/CVERecord?id=CVE-2022-36367"},{"name":"CVE-2022-36370","url":"https://www.cve.org/CVERecord?id=CVE-2022-36370"},{"name":"CVE-2022-26045","url":"https://www.cve.org/CVERecord?id=CVE-2022-26045"},{"name":"CVE-2022-26124","url":"https://www.cve.org/CVERecord?id=CVE-2022-26124"},{"name":"CVE-2022-36400","url":"https://www.cve.org/CVERecord?id=CVE-2022-36400"},{"name":"CVE-2022-28611","url":"https://www.cve.org/CVERecord?id=CVE-2022-28611"},{"name":"CVE-2022-35276","url":"https://www.cve.org/CVERecord?id=CVE-2022-35276"},{"name":"CVE-2022-36377","url":"https://www.cve.org/CVERecord?id=CVE-2022-36377"},{"name":"CVE-2022-28667","url":"https://www.cve.org/CVERecord?id=CVE-2022-28667"},{"name":"CVE-2022-26079","url":"https://www.cve.org/CVERecord?id=CVE-2022-26079"},{"name":"CVE-2021-26251","url":"https://www.cve.org/CVERecord?id=CVE-2021-26251"},{"name":"CVE-2022-29486","url":"https://www.cve.org/CVERecord?id=CVE-2022-29486"},{"name":"CVE-2022-26047","url":"https://www.cve.org/CVERecord?id=CVE-2022-26047"},{"name":"CVE-2022-27639","url":"https://www.cve.org/CVERecord?id=CVE-2022-27639"},{"name":"CVE-2022-29515","url":"https://www.cve.org/CVERecord?id=CVE-2022-29515"},{"name":"CVE-2022-29893","url":"https://www.cve.org/CVERecord?id=CVE-2022-29893"},{"name":"CVE-2022-27499","url":"https://www.cve.org/CVERecord?id=CVE-2022-27499"},{"name":"CVE-2022-30297","url":"https://www.cve.org/CVERecord?id=CVE-2022-30297"},{"name":"CVE-2022-30542","url":"https://www.cve.org/CVERecord?id=CVE-2022-30542"},{"name":"CVE-2022-29466","url":"https://www.cve.org/CVERecord?id=CVE-2022-29466"},{"name":"CVE-2022-26024","url":"https://www.cve.org/CVERecord?id=CVE-2022-26024"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00676 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00676.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00715 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00715.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00687 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00687.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00691 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00691.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00695 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00695.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00713 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00713.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00558 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00558.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00711 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00711.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00720 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00720.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00642 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00642.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00716 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00716.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00747 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00680 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00680.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00699 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00659 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00659.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00683 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00683.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00708 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00708.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00688 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00710 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00710.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00689 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00689.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00673 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00673.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00740 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00740.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00610 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html"}],"reference":"CERTFR-2022-AVI-1009","revisions":[{"description":"Version initiale","revision_date":"2022-11-09T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00752 du 08 novembre 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"}]}
