{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Intel 722 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.5.5","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Killer\u2122 WiFi versions ant\u00e9rieures \u00e0 3.1122.1105","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Open AMT Cloud Toolkit versions ant\u00e9rieures \u00e0 2.0.2 et 2.2.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel E810 Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.6.1.9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Support Android versions ant\u00e9rieures \u00e0 21.7.40","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Team Blue toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.5","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2022.2.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Processors (veuillez vous r\u00e9f\u00e9rer aux avis de l'\u00e9diteur : intel-sa-00706 et intel-sa-00657)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Edge Insights pour les versions Industrial ant\u00e9rieures \u00e0 2.6.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Standard Manageability toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Data Center Manager versions ant\u00e9rieures \u00e0 4.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel PROSet/Wireless WiFi versions ant\u00e9rieure \u00e0 22.120","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Datacenter Group Event Android toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Ethernet 700 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 2.1.5.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel 700 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 8.5","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel DSA versions ant\u00e9rieures 22.2.14","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC9 Extreme Laptop kits versions ant\u00e9rieures \u00e0 2.2.0.22","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Connect M Android versions ant\u00e9rieures \u00e0 1.7.4","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel HAXM versions ant\u00e9rieures \u00e0 7.7.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2022.0.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Killer\u2122 Bluetooth versions ant\u00e9rieures \u00e0 22.120","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUCs versions ant\u00e9rieures \u00e0 BC0076","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel RST versions ant\u00e9rieures \u00e0 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SEAPI toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Ethernet 500 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 1.11.4.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Wireless Bluetooth versions ant\u00e9rieures \u00e0 22.120","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel AMT toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Enpirion Digital Power Configurator GUI toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Datacenter Group Event Advisory iOS toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-28696","url":"https://www.cve.org/CVERecord?id=CVE-2022-28696"},{"name":"CVE-2022-33209","url":"https://www.cve.org/CVERecord?id=CVE-2022-33209"},{"name":"CVE-2022-21197","url":"https://www.cve.org/CVERecord?id=CVE-2022-21197"},{"name":"CVE-2022-29507","url":"https://www.cve.org/CVERecord?id=CVE-2022-29507"},{"name":"CVE-2022-28709","url":"https://www.cve.org/CVERecord?id=CVE-2022-28709"},{"name":"CVE-2022-21233","url":"https://www.cve.org/CVERecord?id=CVE-2022-21233"},{"name":"CVE-2022-21139","url":"https://www.cve.org/CVERecord?id=CVE-2022-21139"},{"name":"CVE-2022-27500","url":"https://www.cve.org/CVERecord?id=CVE-2022-27500"},{"name":"CVE-2022-34345","url":"https://www.cve.org/CVERecord?id=CVE-2022-34345"},{"name":"CVE-2022-30944","url":"https://www.cve.org/CVERecord?id=CVE-2022-30944"},{"name":"CVE-2022-30601","url":"https://www.cve.org/CVERecord?id=CVE-2022-30601"},{"name":"CVE-2022-23182","url":"https://www.cve.org/CVERecord?id=CVE-2022-23182"},{"name":"CVE-2021-23179","url":"https://www.cve.org/CVERecord?id=CVE-2021-23179"},{"name":"CVE-2022-21172","url":"https://www.cve.org/CVERecord?id=CVE-2022-21172"},{"name":"CVE-2022-26344","url":"https://www.cve.org/CVERecord?id=CVE-2022-26344"},{"name":"CVE-2022-21160","url":"https://www.cve.org/CVERecord?id=CVE-2022-21160"},{"name":"CVE-2022-34488","url":"https://www.cve.org/CVERecord?id=CVE-2022-34488"},{"name":"CVE-2022-21152","url":"https://www.cve.org/CVERecord?id=CVE-2022-21152"},{"name":"CVE-2021-33126","url":"https://www.cve.org/CVERecord?id=CVE-2021-33126"},{"name":"CVE-2022-26374","url":"https://www.cve.org/CVERecord?id=CVE-2022-26374"},{"name":"CVE-2022-21793","url":"https://www.cve.org/CVERecord?id=CVE-2022-21793"},{"name":"CVE-2021-23168","url":"https://www.cve.org/CVERecord?id=CVE-2021-23168"},{"name":"CVE-2022-27493","url":"https://www.cve.org/CVERecord?id=CVE-2022-27493"},{"name":"CVE-2022-21225","url":"https://www.cve.org/CVERecord?id=CVE-2022-21225"},{"name":"CVE-2021-26950","url":"https://www.cve.org/CVERecord?id=CVE-2021-26950"},{"name":"CVE-2022-26017","url":"https://www.cve.org/CVERecord?id=CVE-2022-26017"},{"name":"CVE-2022-30296","url":"https://www.cve.org/CVERecord?id=CVE-2022-30296"},{"name":"CVE-2022-22730","url":"https://www.cve.org/CVERecord?id=CVE-2022-22730"},{"name":"CVE-2021-33847","url":"https://www.cve.org/CVERecord?id=CVE-2021-33847"},{"name":"CVE-2022-25999","url":"https://www.cve.org/CVERecord?id=CVE-2022-25999"},{"name":"CVE-2022-21812","url":"https://www.cve.org/CVERecord?id=CVE-2022-21812"},{"name":"CVE-2022-26083","url":"https://www.cve.org/CVERecord?id=CVE-2022-26083"},{"name":"CVE-2022-25841","url":"https://www.cve.org/CVERecord?id=CVE-2022-25841"},{"name":"CVE-2021-33060","url":"https://www.cve.org/CVERecord?id=CVE-2021-33060"},{"name":"CVE-2022-21181","url":"https://www.cve.org/CVERecord?id=CVE-2022-21181"},{"name":"CVE-2021-26254","url":"https://www.cve.org/CVERecord?id=CVE-2021-26254"},{"name":"CVE-2022-25899","url":"https://www.cve.org/CVERecord?id=CVE-2022-25899"},{"name":"CVE-2021-44545","url":"https://www.cve.org/CVERecord?id=CVE-2021-44545"},{"name":"CVE-2018-1285","url":"https://www.cve.org/CVERecord?id=CVE-2018-1285"},{"name":"CVE-2022-26373","url":"https://www.cve.org/CVERecord?id=CVE-2022-26373"},{"name":"CVE-2021-44470","url":"https://www.cve.org/CVERecord?id=CVE-2021-44470"},{"name":"CVE-2022-25966","url":"https://www.cve.org/CVERecord?id=CVE-2022-25966"},{"name":"CVE-2022-28858","url":"https://www.cve.org/CVERecord?id=CVE-2022-28858"},{"name":"CVE-2022-21140","url":"https://www.cve.org/CVERecord?id=CVE-2022-21140"},{"name":"CVE-2022-26844","url":"https://www.cve.org/CVERecord?id=CVE-2022-26844"},{"name":"CVE-2022-21212","url":"https://www.cve.org/CVERecord?id=CVE-2022-21212"},{"name":"CVE-2021-33128","url":"https://www.cve.org/CVERecord?id=CVE-2021-33128"},{"name":"CVE-2022-23403","url":"https://www.cve.org/CVERecord?id=CVE-2022-23403"},{"name":"CVE-2022-21229","url":"https://www.cve.org/CVERecord?id=CVE-2022-21229"},{"name":"CVE-2021-26257","url":"https://www.cve.org/CVERecord?id=CVE-2021-26257"},{"name":"CVE-2022-28697","url":"https://www.cve.org/CVERecord?id=CVE-2022-28697"},{"name":"CVE-2021-23188","url":"https://www.cve.org/CVERecord?id=CVE-2021-23188"},{"name":"CVE-2022-21807","url":"https://www.cve.org/CVERecord?id=CVE-2022-21807"},{"name":"CVE-2022-32579","url":"https://www.cve.org/CVERecord?id=CVE-2022-32579"},{"name":"CVE-2022-21148","url":"https://www.cve.org/CVERecord?id=CVE-2022-21148"},{"name":"CVE-2022-26074","url":"https://www.cve.org/CVERecord?id=CVE-2022-26074"},{"name":"CVE-2021-37409","url":"https://www.cve.org/CVERecord?id=CVE-2021-37409"},{"name":"CVE-2021-23223","url":"https://www.cve.org/CVERecord?id=CVE-2021-23223"},{"name":"CVE-2022-21240","url":"https://www.cve.org/CVERecord?id=CVE-2022-21240"},{"name":"CVE-2022-24378","url":"https://www.cve.org/CVERecord?id=CVE-2022-24378"}],"links":[],"reference":"CERTFR-2022-AVI-727","revisions":[{"description":"Version initiale","revision_date":"2022-08-10T00:00:00.000000"}],"risks":[{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d'entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service, une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00701.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00701.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00703.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00703.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00669.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00669.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00686.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00686.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00679.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00679.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00668.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00668.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00657.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00660.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00660.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00593.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00593.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00684.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00684.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00653.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00653.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00658.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00709.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00621.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00672.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00672.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00628.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00596.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00596.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00665.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00655.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00655.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00712.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00712.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00678.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00678.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00667.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00705.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00705.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00706.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00694.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00694.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00650.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00650.html.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00662.html du 09 ao\u00fbt 2022","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00662.html.html"}]}
