## Summary:
A potential security vulnerability in the Intel® Single Event API (SEAPI) software may allow escalation of privilege. Intel is not releasing updates to mitigate this potential vulnerability and has issued a Product Discontinuation Notice for the Intel® SEAPI software.
## Vulnerability Details:
CVEID: [CVE-2022-26844]()
Description: Insufficiently protected credentials in the installation binaries for Intel(R) SEAPI in all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: [CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H]()****
CVEID: [CVE-2022-26344]()
Description: Incorrect default permissions in the installation binaries for Intel(R) SEAPI all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: [CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H]()****
CVEID: [CVE-2022-26374]()
Description: Uncontrolled search path in the installation binaries for Intel(R) SEAPI all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: [CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H]()****
## Affected Products:
Intel® SEAPI, all versions.
## Recommendation:
Intel has issued a Product Discontinuation Notice for Intel® SEAPI and recommends that users of Intel® SEAPI uninstall or discontinue use at their earliest convenience.
Github:
## Acknowledgements:
Intel would like to thank Aviva Noa for reporting these issues.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.Read More
References
Back to Main