{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<ul> <li>2023.2 IPU \u2013 BIOS</li> <li>DSP Builder pour Intel FPGAs Pro Edition Software</li> <li>Intel NUC BIOS Firmware</li> <li>Intel Connect M Android App</li> <li>Intel DCM Software</li> <li>Intel DCM</li> <li>Intel EMA Configuration Tool and Intel MC Software</li> <li>Intel EMA Software</li> <li>Intel FPGA Firmware</li> <li>Intel IPP Cryptography</li> <li>Intel MacCPUID Software</li> <li>Intel NUC BIOS Update Software</li> <li>Intel NUC Laptop Element Software</li> <li>Intel NUC Pro Software Suite</li> <li>Intel NUC Software Studio Service Installer</li> <li>Intel OFU Software</li> <li>Intel Pathfinder pour RISC-V</li> <li>Intel QAT Driver</li> <li>Intel QAT Engine pour OpenSSL</li> <li>Intel QAT</li> <li>Intel Quartus Prime Pro Software</li> <li>Intel Retail Edge Mobile App</li> <li>Intel SCS Add-on Software Installer</li> <li>Intel SCS Software</li> <li>Intel SUR Software</li> <li>Intel Server Board BMC Firmware</li> <li>Intel Smart Campus Android App</li> <li>Intel Trace Analyzer and Collector Software</li> <li>Intel Unite Android App</li> <li>Intel Unite Client Software</li> <li>Intel Unite Plugin SDK</li> <li>Intel VROC Software</li> <li>Intel VTune\u2122 Profiler</li> <li>Intel i915 Graphics Drivers pour Linux</li> <li>Intel oneAPI Toolkit and Component Software Installers</li> <li>Open CAS</li> <li>WULT Software</li> </ul> <p>Pour plus d'informations, veuillez-vous r\u00e9f\u00e9rer aux avis de l'\u00e9diteur.</p> ","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-23910","url":"https://www.cve.org/CVERecord?id=CVE-2023-23910"},{"name":"CVE-2023-22443","url":"https://www.cve.org/CVERecord?id=CVE-2023-22443"},{"name":"CVE-2022-40974","url":"https://www.cve.org/CVERecord?id=CVE-2022-40974"},{"name":"CVE-2022-41628","url":"https://www.cve.org/CVERecord?id=CVE-2022-41628"},{"name":"CVE-2022-43465","url":"https://www.cve.org/CVERecord?id=CVE-2022-43465"},{"name":"CVE-2022-43475","url":"https://www.cve.org/CVERecord?id=CVE-2022-43475"},{"name":"CVE-2022-25976","url":"https://www.cve.org/CVERecord?id=CVE-2022-25976"},{"name":"CVE-2022-21239","url":"https://www.cve.org/CVERecord?id=CVE-2022-21239"},{"name":"CVE-2022-40972","url":"https://www.cve.org/CVERecord?id=CVE-2022-40972"},{"name":"CVE-2023-27382","url":"https://www.cve.org/CVERecord?id=CVE-2023-27382"},{"name":"CVE-2022-37409","url":"https://www.cve.org/CVERecord?id=CVE-2022-37409"},{"name":"CVE-2023-22355","url":"https://www.cve.org/CVERecord?id=CVE-2023-22355"},{"name":"CVE-2022-44619","url":"https://www.cve.org/CVERecord?id=CVE-2022-44619"},{"name":"CVE-2022-34855","url":"https://www.cve.org/CVERecord?id=CVE-2022-34855"},{"name":"CVE-2022-41801","url":"https://www.cve.org/CVERecord?id=CVE-2022-41801"},{"name":"CVE-2022-36391","url":"https://www.cve.org/CVERecord?id=CVE-2022-36391"},{"name":"CVE-2023-25175","url":"https://www.cve.org/CVERecord?id=CVE-2023-25175"},{"name":"CVE-2022-41699","url":"https://www.cve.org/CVERecord?id=CVE-2022-41699"},{"name":"CVE-2023-22312","url":"https://www.cve.org/CVERecord?id=CVE-2023-22312"},{"name":"CVE-2022-34848","url":"https://www.cve.org/CVERecord?id=CVE-2022-34848"},{"name":"CVE-2022-46279","url":"https://www.cve.org/CVERecord?id=CVE-2022-46279"},{"name":"CVE-2022-46645","url":"https://www.cve.org/CVERecord?id=CVE-2022-46645"},{"name":"CVE-2023-25771","url":"https://www.cve.org/CVERecord?id=CVE-2023-25771"},{"name":"CVE-2023-22440","url":"https://www.cve.org/CVERecord?id=CVE-2023-22440"},{"name":"CVE-2022-38087","url":"https://www.cve.org/CVERecord?id=CVE-2022-38087"},{"name":"CVE-2022-43507","url":"https://www.cve.org/CVERecord?id=CVE-2022-43507"},{"name":"CVE-2022-32578","url":"https://www.cve.org/CVERecord?id=CVE-2022-32578"},{"name":"CVE-2023-22297","url":"https://www.cve.org/CVERecord?id=CVE-2023-22297"},{"name":"CVE-2023-22447","url":"https://www.cve.org/CVERecord?id=CVE-2023-22447"},{"name":"CVE-2022-45128","url":"https://www.cve.org/CVERecord?id=CVE-2022-45128"},{"name":"CVE-2022-30338","url":"https://www.cve.org/CVERecord?id=CVE-2022-30338"},{"name":"CVE-2023-25776","url":"https://www.cve.org/CVERecord?id=CVE-2023-25776"},{"name":"CVE-2023-22379","url":"https://www.cve.org/CVERecord?id=CVE-2023-22379"},{"name":"CVE-2022-42465","url":"https://www.cve.org/CVERecord?id=CVE-2022-42465"},{"name":"CVE-2022-42878","url":"https://www.cve.org/CVERecord?id=CVE-2022-42878"},{"name":"CVE-2023-23573","url":"https://www.cve.org/CVERecord?id=CVE-2023-23573"},{"name":"CVE-2022-36339","url":"https://www.cve.org/CVERecord?id=CVE-2022-36339"},{"name":"CVE-2022-41982","url":"https://www.cve.org/CVERecord?id=CVE-2022-41982"},{"name":"CVE-2023-27298","url":"https://www.cve.org/CVERecord?id=CVE-2023-27298"},{"name":"CVE-2022-41771","url":"https://www.cve.org/CVERecord?id=CVE-2022-41771"},{"name":"CVE-2023-28410","url":"https://www.cve.org/CVERecord?id=CVE-2023-28410"},{"name":"CVE-2023-25179","url":"https://www.cve.org/CVERecord?id=CVE-2023-25179"},{"name":"CVE-2023-23909","url":"https://www.cve.org/CVERecord?id=CVE-2023-23909"},{"name":"CVE-2022-38787","url":"https://www.cve.org/CVERecord?id=CVE-2022-38787"},{"name":"CVE-2023-27386","url":"https://www.cve.org/CVERecord?id=CVE-2023-27386"},{"name":"CVE-2023-23569","url":"https://www.cve.org/CVERecord?id=CVE-2023-23569"},{"name":"CVE-2022-41769","url":"https://www.cve.org/CVERecord?id=CVE-2022-41769"},{"name":"CVE-2022-38103","url":"https://www.cve.org/CVERecord?id=CVE-2022-38103"},{"name":"CVE-2022-31477","url":"https://www.cve.org/CVERecord?id=CVE-2022-31477"},{"name":"CVE-2022-33894","url":"https://www.cve.org/CVERecord?id=CVE-2022-33894"},{"name":"CVE-2022-28699","url":"https://www.cve.org/CVERecord?id=CVE-2022-28699"},{"name":"CVE-2022-46656","url":"https://www.cve.org/CVERecord?id=CVE-2022-46656"},{"name":"CVE-2022-43474","url":"https://www.cve.org/CVERecord?id=CVE-2022-43474"},{"name":"CVE-2022-41784","url":"https://www.cve.org/CVERecord?id=CVE-2022-41784"},{"name":"CVE-2022-40685","url":"https://www.cve.org/CVERecord?id=CVE-2022-40685"},{"name":"CVE-2023-28411","url":"https://www.cve.org/CVERecord?id=CVE-2023-28411"},{"name":"CVE-2022-41658","url":"https://www.cve.org/CVERecord?id=CVE-2022-41658"},{"name":"CVE-2022-32766","url":"https://www.cve.org/CVERecord?id=CVE-2022-32766"},{"name":"CVE-2022-29919","url":"https://www.cve.org/CVERecord?id=CVE-2022-29919"},{"name":"CVE-2022-38101","url":"https://www.cve.org/CVERecord?id=CVE-2022-38101"},{"name":"CVE-2023-25545","url":"https://www.cve.org/CVERecord?id=CVE-2023-25545"},{"name":"CVE-2022-29508","url":"https://www.cve.org/CVERecord?id=CVE-2022-29508"},{"name":"CVE-2023-22661","url":"https://www.cve.org/CVERecord?id=CVE-2023-22661"},{"name":"CVE-2022-34147","url":"https://www.cve.org/CVERecord?id=CVE-2022-34147"},{"name":"CVE-2022-41690","url":"https://www.cve.org/CVERecord?id=CVE-2022-41690"},{"name":"CVE-2023-22442","url":"https://www.cve.org/CVERecord?id=CVE-2023-22442"},{"name":"CVE-2022-41979","url":"https://www.cve.org/CVERecord?id=CVE-2022-41979"},{"name":"CVE-2022-41693","url":"https://www.cve.org/CVERecord?id=CVE-2022-41693"},{"name":"CVE-2022-25772","url":"https://www.cve.org/CVERecord?id=CVE-2022-25772"},{"name":"CVE-2022-27180","url":"https://www.cve.org/CVERecord?id=CVE-2022-27180"},{"name":"CVE-2022-33963","url":"https://www.cve.org/CVERecord?id=CVE-2022-33963"},{"name":"CVE-2023-24475","url":"https://www.cve.org/CVERecord?id=CVE-2023-24475"},{"name":"CVE-2022-41646","url":"https://www.cve.org/CVERecord?id=CVE-2022-41646"},{"name":"CVE-2022-40207","url":"https://www.cve.org/CVERecord?id=CVE-2022-40207"},{"name":"CVE-2022-32577","url":"https://www.cve.org/CVERecord?id=CVE-2022-32577"},{"name":"CVE-2022-40210","url":"https://www.cve.org/CVERecord?id=CVE-2022-40210"},{"name":"CVE-2022-21804","url":"https://www.cve.org/CVERecord?id=CVE-2022-21804"},{"name":"CVE-2022-44610","url":"https://www.cve.org/CVERecord?id=CVE-2022-44610"},{"name":"CVE-2022-41621","url":"https://www.cve.org/CVERecord?id=CVE-2022-41621"},{"name":"CVE-2022-41610","url":"https://www.cve.org/CVERecord?id=CVE-2022-41610"},{"name":"CVE-2023-23580","url":"https://www.cve.org/CVERecord?id=CVE-2023-23580"},{"name":"CVE-2022-41687","url":"https://www.cve.org/CVERecord?id=CVE-2022-41687"},{"name":"CVE-2022-32576","url":"https://www.cve.org/CVERecord?id=CVE-2022-32576"},{"name":"CVE-2022-37327","url":"https://www.cve.org/CVERecord?id=CVE-2022-37327"},{"name":"CVE-2022-41998","url":"https://www.cve.org/CVERecord?id=CVE-2022-41998"},{"name":"CVE-2022-41808","url":"https://www.cve.org/CVERecord?id=CVE-2022-41808"},{"name":"CVE-2022-32582","url":"https://www.cve.org/CVERecord?id=CVE-2022-32582"}],"links":[],"reference":"CERTFR-2023-AVI-0371","revisions":[{"description":"Version initiale","revision_date":"2023-05-10T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00809 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00816 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00816.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00886 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00886.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00797 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00797.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00819 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00798 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00798.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00796 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00796.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00853 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00853.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00825 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00825.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00771 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00771.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00807 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00805 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00855 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00855.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00847 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00802 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00692 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00692.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00854 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00854.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00799 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00799.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00785 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00785.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00784 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00784.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00834 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00834.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00792 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00792.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00824 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00782 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00782.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00778 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00778.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00839 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00806 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00806.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00772 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00772.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00780 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00779 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00779.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00788 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00788.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00808 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00808.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00777 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00832 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00832.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00723 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00723.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00827 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00827.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00815 du 09 mai 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00815.html"}]}
