First published: Thu Feb 16 2023(Updated: )
Improper condition check in some Intel(R) SPS firmware before version SPS_E3_06.00.03.300.0 may allow a privileged user to potentially enable denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Server Platform Services | <sps_e3_06.00.03.300.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-36794.
The severity of CVE-2022-36794 is medium with a CVSS score of 4.4.
The affected software for CVE-2022-36794 is Intel Server Platform Services version up to exclusive SPS_E3_06.00.03.300.0.
A privileged user may potentially enable denial of service through CVE-2022-36794 by exploiting an improper condition check in some Intel(R) SPS firmware.
You can find more information about CVE-2022-36794 at the following link: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00718.html