7.8
CVSSv3

CVE-2022-36348

Published: 16/02/2023 Updated: 08/08/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Active debug code in some Intel (R) SPS firmware before version SPS_E5_04.04.04.300.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel server platform services

Recent Articles

Intel patches up SGX best it can after another load of security holes found
The Register

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Plus bugs squashed in Server Platform Services and more APIC fail: Intel 'Sunny Cove' chips with SGX spill secrets

Intel's Software Guard Extensions (SGX) are under the spotlight again after the chipmaker disclosed several newly discovered vulnerabilities affecting the tech, and recommended users update their firmware. The security holes are among the latest disclosures listed on Intel's Security Center page. These cover a wide range of Intel products including Xeon processors, network adapters, and also software. Overall, there were 31 advisories added to the Intel Security Center as of February 14, as we n...