var-202202-0480
Vulnerability from variot
Improper conditions check in the Intel(R) IPP Crypto library before version 2021.2 may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) IPP Crypto library Exists in an exceptional condition check vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0480", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "integrated performance primitives cryptography", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "2021.2" }, { "model": "intel integrated performance primitives", "scope": "eq", "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": "cryptography 2021.2" }, { "model": "intel integrated performance primitives", "scope": "eq", "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005126" }, { "db": "NVD", "id": "CVE-2021-33147" } ] }, "cve": "CVE-2021-33147", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-33147", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-393161", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-33147", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-33147", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-33147", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-33147", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202202-710", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-393161", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-393161" }, { "db": "JVNDB", "id": "JVNDB-2022-005126" }, { "db": "CNNVD", "id": "CNNVD-202202-710" }, { "db": "NVD", "id": "CVE-2021-33147" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper conditions check in the Intel(R) IPP Crypto library before version 2021.2 may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) IPP Crypto library Exists in an exceptional condition check vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-33147" }, { "db": "JVNDB", "id": "JVNDB-2022-005126" }, { "db": "VULHUB", "id": "VHN-393161" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-33147", "trust": 3.3 }, { "db": "JVN", "id": "JVNVU99045838", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-005126", "trust": 0.8 }, { "db": "LENOVO", "id": "LEN-76842", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0542", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022020917", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202202-710", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-393161", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-393161" }, { "db": "JVNDB", "id": "JVNDB-2022-005126" }, { "db": "CNNVD", "id": "CNNVD-202202-710" }, { "db": "NVD", "id": "CVE-2021-33147" } ] }, "id": "VAR-202202-0480", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-393161" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T12:09:27.817000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00600", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00600.html" }, { "title": "Intel Integrated Performance Primitives Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=182184" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005126" }, { "db": "CNNVD", "id": "CNNVD-202202-710" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-754", "trust": 1.1 }, { "problemtype": "Improper checking in exceptional conditions (CWE-754) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-393161" }, { "db": "JVNDB", "id": "JVNDB-2022-005126" }, { "db": "NVD", "id": "CVE-2021-33147" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00600.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33147" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu99045838" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022020917" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0542" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-76842" } ], "sources": [ { "db": "VULHUB", "id": "VHN-393161" }, { "db": "JVNDB", "id": "JVNDB-2022-005126" }, { "db": "CNNVD", "id": "CNNVD-202202-710" }, { "db": "NVD", "id": "CVE-2021-33147" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-393161" }, { "db": "JVNDB", "id": "JVNDB-2022-005126" }, { "db": "CNNVD", "id": "CNNVD-202202-710" }, { "db": "NVD", "id": "CVE-2021-33147" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-393161" }, { "date": "2023-05-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005126" }, { "date": "2022-02-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-710" }, { "date": "2022-02-09T23:15:15.783000", "db": "NVD", "id": "CVE-2021-33147" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-15T00:00:00", "db": "VULHUB", "id": "VHN-393161" }, { "date": "2023-05-18T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-005126" }, { "date": "2022-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-710" }, { "date": "2022-02-15T16:51:32.753000", "db": "NVD", "id": "CVE-2021-33147" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-710" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel(R)\u00a0IPP\u00a0Crypto\u00a0library\u00a0 Vulnerability in checking for exceptional conditions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005126" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-710" } ], "trust": 0.6 } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.