CVE-2022-26074: denial of service in Intel(R) SPS
Incomplete cleanup in a firmware subsystem for Intel(R) SPS before versions SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0 may allow a privileged user to potentially enable denial of service via local access.
AI Analysis
Technical Summary
CVE-2022-26074 is a vulnerability identified in Intel(R) SPS (Server Platform Services), a firmware subsystem used in Intel server platforms to manage various low-level system functions. The issue arises due to incomplete cleanup processes within the firmware subsystem in versions prior to SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0. This incomplete cleanup can be exploited by a privileged local user to trigger a denial of service (DoS) condition. Specifically, the vulnerability allows a user with high privileges on the local system to cause the SPS firmware to enter a state where it becomes unresponsive or otherwise disrupts normal server operations. The vulnerability is classified under CWE-459 (Incomplete Cleanup), indicating that residual data or state left uncleared can be manipulated to cause adverse effects. The CVSS v3.1 base score is 4.4, reflecting a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) but high privileges (PR:H) and no user interaction (UI:N). The impact affects availability only (A:H), with no confidentiality or integrity impact. No known exploits are reported in the wild, and no patches are linked in the provided data, though updated SPS firmware versions have addressed the issue. This vulnerability is relevant primarily in environments running affected Intel SPS firmware versions, typically in enterprise server hardware where SPS manages critical platform functions.
Potential Impact
For European organizations, particularly those operating data centers, cloud infrastructure, or enterprise servers using Intel platforms with affected SPS firmware versions, this vulnerability poses a risk of local denial of service. While exploitation requires privileged local access, an attacker or malicious insider with such access could disrupt server availability, leading to potential downtime, service interruptions, and operational impacts. This could affect critical business applications, cloud services, or infrastructure management systems. The impact is availability-focused, so confidentiality and integrity of data are not directly threatened. However, service outages can have cascading effects on business continuity and SLAs. Given the reliance on Intel server hardware across European enterprises and cloud providers, the risk is non-negligible, especially in sectors with high availability requirements such as finance, telecommunications, and public services. The absence of known exploits reduces immediate risk, but the presence of a medium severity vulnerability in firmware underscores the need for vigilance and timely patching.
Mitigation Recommendations
European organizations should prioritize updating Intel SPS firmware to versions SPS_E3_04.08.04.330.0 or SPS_E3_04.01.04.530.0 or later, as these versions contain fixes for the vulnerability. Since the vulnerability requires privileged local access, organizations should enforce strict access controls and monitoring on server management interfaces and administrative accounts to prevent unauthorized privilege escalation or misuse. Implementing robust endpoint security and host-based intrusion detection can help detect suspicious local activities. Regular firmware inventory and compliance audits should be conducted to identify and remediate outdated SPS versions. Additionally, organizations should incorporate this vulnerability into their vulnerability management and patching workflows, ensuring coordination between hardware vendors and IT operations teams. In environments where immediate firmware updates are not feasible, limiting privileged user access and isolating critical servers can reduce exploitation risk. Finally, maintaining comprehensive logging and alerting on server management operations can aid in early detection of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Ireland
CVE-2022-26074: denial of service in Intel(R) SPS
Description
Incomplete cleanup in a firmware subsystem for Intel(R) SPS before versions SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0 may allow a privileged user to potentially enable denial of service via local access.
AI-Powered Analysis
Technical Analysis
CVE-2022-26074 is a vulnerability identified in Intel(R) SPS (Server Platform Services), a firmware subsystem used in Intel server platforms to manage various low-level system functions. The issue arises due to incomplete cleanup processes within the firmware subsystem in versions prior to SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0. This incomplete cleanup can be exploited by a privileged local user to trigger a denial of service (DoS) condition. Specifically, the vulnerability allows a user with high privileges on the local system to cause the SPS firmware to enter a state where it becomes unresponsive or otherwise disrupts normal server operations. The vulnerability is classified under CWE-459 (Incomplete Cleanup), indicating that residual data or state left uncleared can be manipulated to cause adverse effects. The CVSS v3.1 base score is 4.4, reflecting a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) but high privileges (PR:H) and no user interaction (UI:N). The impact affects availability only (A:H), with no confidentiality or integrity impact. No known exploits are reported in the wild, and no patches are linked in the provided data, though updated SPS firmware versions have addressed the issue. This vulnerability is relevant primarily in environments running affected Intel SPS firmware versions, typically in enterprise server hardware where SPS manages critical platform functions.
Potential Impact
For European organizations, particularly those operating data centers, cloud infrastructure, or enterprise servers using Intel platforms with affected SPS firmware versions, this vulnerability poses a risk of local denial of service. While exploitation requires privileged local access, an attacker or malicious insider with such access could disrupt server availability, leading to potential downtime, service interruptions, and operational impacts. This could affect critical business applications, cloud services, or infrastructure management systems. The impact is availability-focused, so confidentiality and integrity of data are not directly threatened. However, service outages can have cascading effects on business continuity and SLAs. Given the reliance on Intel server hardware across European enterprises and cloud providers, the risk is non-negligible, especially in sectors with high availability requirements such as finance, telecommunications, and public services. The absence of known exploits reduces immediate risk, but the presence of a medium severity vulnerability in firmware underscores the need for vigilance and timely patching.
Mitigation Recommendations
European organizations should prioritize updating Intel SPS firmware to versions SPS_E3_04.08.04.330.0 or SPS_E3_04.01.04.530.0 or later, as these versions contain fixes for the vulnerability. Since the vulnerability requires privileged local access, organizations should enforce strict access controls and monitoring on server management interfaces and administrative accounts to prevent unauthorized privilege escalation or misuse. Implementing robust endpoint security and host-based intrusion detection can help detect suspicious local activities. Regular firmware inventory and compliance audits should be conducted to identify and remediate outdated SPS versions. Additionally, organizations should incorporate this vulnerability into their vulnerability management and patching workflows, ensuring coordination between hardware vendors and IT operations teams. In environments where immediate firmware updates are not feasible, limiting privileged user access and isolating critical servers can reduce exploitation risk. Finally, maintaining comprehensive logging and alerting on server management operations can aid in early detection of exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2022-03-02T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdc116
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:42:26 PM
Last updated: 2/7/2026, 8:59:03 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.