{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<ul> <li>Intel Manageability Commander versions ant\u00e9rieures \u00e0 2.2</li> <li>Intel In-Band Manageability versions ant\u00e9rieures \u00e0 2.13.0</li> <li>Pilotes du noyau Linux Intel SGX fournis par Intel versions 2.14 et ant\u00e9rieures. Les pilotes Intel SGX ont \u00e9t\u00e9 int\u00e9gr\u00e9s au noyau Linux depuis la version 5.11.</li> <li>Intel Killer Control Center versions ant\u00e9rieures \u00e0 2.4.3337.0</li> <li>Intel Advisor software versions ant\u00e9rieures \u00e0 7.6.0.37</li> <li>Intel XTU software versions ant\u00e9rieures \u00e0 7.3.0.33</li> </ul> <p>Se r\u00e9f\u00e9rer aux avis de l'\u00e9diteur pour les vuln\u00e9rabilit\u00e9s concernant les micrologiciels et mat\u00e9riels Intel.</p> ","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2021-33117","url":"https://www.cve.org/CVERecord?id=CVE-2021-33117"},{"name":"CVE-2021-33135","url":"https://www.cve.org/CVERecord?id=CVE-2021-33135"},{"name":"CVE-2021-33075","url":"https://www.cve.org/CVERecord?id=CVE-2021-33075"},{"name":"CVE-2021-0155","url":"https://www.cve.org/CVERecord?id=CVE-2021-0155"},{"name":"CVE-2021-0154","url":"https://www.cve.org/CVERecord?id=CVE-2021-0154"},{"name":"CVE-2022-21151","url":"https://www.cve.org/CVERecord?id=CVE-2022-21151"},{"name":"CVE-2021-0188","url":"https://www.cve.org/CVERecord?id=CVE-2021-0188"},{"name":"CVE-2021-0159","url":"https://www.cve.org/CVERecord?id=CVE-2021-0159"},{"name":"CVE-2021-33080","url":"https://www.cve.org/CVERecord?id=CVE-2021-33080"},{"name":"CVE-2021-33108","url":"https://www.cve.org/CVERecord?id=CVE-2021-33108"},{"name":"CVE-2021-33103","url":"https://www.cve.org/CVERecord?id=CVE-2021-33103"},{"name":"CVE-2021-33123","url":"https://www.cve.org/CVERecord?id=CVE-2021-33123"},{"name":"CVE-2022-22139","url":"https://www.cve.org/CVERecord?id=CVE-2022-22139"},{"name":"CVE-2021-33078","url":"https://www.cve.org/CVERecord?id=CVE-2021-33078"},{"name":"CVE-2021-33122","url":"https://www.cve.org/CVERecord?id=CVE-2021-33122"},{"name":"CVE-2021-26258","url":"https://www.cve.org/CVERecord?id=CVE-2021-26258"},{"name":"CVE-2021-33130","url":"https://www.cve.org/CVERecord?id=CVE-2021-33130"},{"name":"CVE-2022-0005","url":"https://www.cve.org/CVERecord?id=CVE-2022-0005"},{"name":"CVE-2021-0190","url":"https://www.cve.org/CVERecord?id=CVE-2021-0190"},{"name":"CVE-2022-24297","url":"https://www.cve.org/CVERecord?id=CVE-2022-24297"},{"name":"CVE-2021-33082","url":"https://www.cve.org/CVERecord?id=CVE-2021-33082"},{"name":"CVE-2021-33077","url":"https://www.cve.org/CVERecord?id=CVE-2021-33077"},{"name":"CVE-2021-33124","url":"https://www.cve.org/CVERecord?id=CVE-2021-33124"},{"name":"CVE-2021-33069","url":"https://www.cve.org/CVERecord?id=CVE-2021-33069"},{"name":"CVE-2021-0194","url":"https://www.cve.org/CVERecord?id=CVE-2021-0194"},{"name":"CVE-2021-33083","url":"https://www.cve.org/CVERecord?id=CVE-2021-33083"},{"name":"CVE-2022-21136","url":"https://www.cve.org/CVERecord?id=CVE-2022-21136"},{"name":"CVE-2021-0126","url":"https://www.cve.org/CVERecord?id=CVE-2021-0126"},{"name":"CVE-2022-21237","url":"https://www.cve.org/CVERecord?id=CVE-2022-21237"},{"name":"CVE-2021-33107","url":"https://www.cve.org/CVERecord?id=CVE-2021-33107"},{"name":"CVE-2022-24382","url":"https://www.cve.org/CVERecord?id=CVE-2022-24382"},{"name":"CVE-2021-33149","url":"https://www.cve.org/CVERecord?id=CVE-2021-33149"},{"name":"CVE-2021-33074","url":"https://www.cve.org/CVERecord?id=CVE-2021-33074"},{"name":"CVE-2022-21131","url":"https://www.cve.org/CVERecord?id=CVE-2022-21131"},{"name":"CVE-2022-0004","url":"https://www.cve.org/CVERecord?id=CVE-2022-0004"},{"name":"CVE-2022-21128","url":"https://www.cve.org/CVERecord?id=CVE-2022-21128"},{"name":"CVE-2021-0153","url":"https://www.cve.org/CVERecord?id=CVE-2021-0153"},{"name":"CVE-2021-0193","url":"https://www.cve.org/CVERecord?id=CVE-2021-0193"},{"name":"CVE-2021-0189","url":"https://www.cve.org/CVERecord?id=CVE-2021-0189"}],"links":[],"reference":"CERTFR-2022-AVI-444","revisions":[{"description":"Version initiale","revision_date":"2022-05-11T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00663 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00663.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00654 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00519 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00519.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00595 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00595.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00648 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00648.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00614 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00614.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00661 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00661.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00613 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00613.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00617 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00563 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00563.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00586 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00586.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00616 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00616.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00549 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00549.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00644 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00644.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00601 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00603 du 10 mai 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00603.html"}]}
