Vulnerability Description
Improper input validation in the firmware for some Intel(R) Server Board S2600WF, Intel(R) Server System R1000WF and Intel(R) Server System R2000WF families before version R02.01.0014 may allow a privileged user to potentially enable an escalation of privilege via local access.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intel | S2600Wf Firmware | <= 02.01.0014 |
| Intel | S2600Wf | - |
| Intel | R1000Wf Firmware | <= 02.01.0014 |
| Intel | R1000Wf | - |
| Intel | R2000Wf Firmware | <= 02.01.0014 |
| Intel | R2000Wf | - |
Related Weaknesses (CWE)
References
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00708.PatchVendor Advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00708.PatchVendor Advisory
FAQ
What is CVE-2022-30542?
CVE-2022-30542 is a vulnerability with a CVSS score of 8.2 (HIGH). Improper input validation in the firmware for some Intel(R) Server Board S2600WF, Intel(R) Server System R1000WF and Intel(R) Server System R2000WF families before version R02.01.0014 may allow a priv...
How severe is CVE-2022-30542?
CVE-2022-30542 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-30542?
Check the references section above for vendor advisories and patch information. Affected products include: Intel S2600Wf Firmware, Intel S2600Wf, Intel R1000Wf Firmware, Intel R1000Wf, Intel R2000Wf Firmware.