First published: Fri Nov 11 2022(Updated: )
Improper input validation in the firmware for some Intel(R) Server Board S2600WF, Intel(R) Server System R1000WF and Intel(R) Server System R2000WF families before version R02.01.0014 may allow a privileged user to potentially enable an escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel S2600WFQR Firmware | <=02.01.0014 | |
Intel S2600WF0 | ||
Intel R1000WF firmware | <=02.01.0014 | |
Intel Server System R1000WF | ||
Intel R2000WF firmware | <=02.01.0014 | |
Intel R2000WF firmware | ||
All of | ||
Intel S2600WFQR Firmware | <=02.01.0014 | |
Intel S2600WF0 | ||
All of | ||
Intel R1000WF firmware | <=02.01.0014 | |
Intel Server System R1000WF | ||
All of | ||
Intel R2000WF firmware | <=02.01.0014 | |
Intel R2000WF firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30542 has been classified as a high severity vulnerability due to the potential for privilege escalation.
To fix CVE-2022-30542, update the firmware of affected Intel Server Board S2600WF, Intel Server System R1000WF, or Intel Server System R2000WF devices to version R02.01.0014 or later.
CVE-2022-30542 exploits improper input validation in the firmware, potentially allowing a privileged user to escalate privileges.
CVE-2022-30542 affects Intel Server Board S2600WF, Intel Server System R1000WF, and Intel Server System R2000WF families with firmware versions before R02.01.0014.
Privileged users with local access to the affected Intel server systems are at risk of potential escalation of privileges due to CVE-2022-30542.