Site icon API Security Blog

Intel® SEAPI Advisory

## Summary:

A potential security vulnerability in the Intel® Single Event API (SEAPI) software may allow escalation of privilege. Intel is not releasing updates to mitigate this potential vulnerability and has issued a Product Discontinuation Notice for the Intel® SEAPI software.

## Vulnerability Details:

CVEID: [CVE-2022-26844]()

Description: Insufficiently protected credentials in the installation binaries for Intel(R) SEAPI in all versions may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS Base Score: 6.7 Medium

CVSS Vector: [CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H]()****

CVEID: [CVE-2022-26344]()

Description: Incorrect default permissions in the installation binaries for Intel(R) SEAPI all versions may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS Base Score: 6.7 Medium

CVSS Vector: [CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H]()****

CVEID: [CVE-2022-26374]()

Description: Uncontrolled search path in the installation binaries for Intel(R) SEAPI all versions may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS Base Score: 6.7 Medium

CVSS Vector: [CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H]()****

## Affected Products:

Intel® SEAPI, all versions.

## Recommendation:

Intel has issued a Product Discontinuation Notice for Intel® SEAPI and recommends that users of Intel® SEAPI uninstall or discontinue use at their earliest convenience.

Github:

## Acknowledgements:

Intel would like to thank Aviva Noa for reporting these issues.

Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.Read More

Exit mobile version