First published: Wed May 10 2023(Updated: )
Improper access control in the Intel(R) SUR software before version 2.4.8989 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel System Usage Report | <2.4.8989 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40207 has been classified as having a medium severity, as it involves improper access control that can lead to elevated privileges.
To fix CVE-2022-40207, upgrade the Intel System Usage Report software to version 2.4.8989 or newer.
Users of Intel(R) System Usage Report software versions prior to 2.4.8989 are impacted by CVE-2022-40207.
CVE-2022-40207 is classified as an access control vulnerability that allows escalation of privilege.
CVE-2022-40207 requires local access for exploitation, meaning an authenticated user must be on the system to perform the attack.