CVE-2022-26074: denial of service in Intel(R) SPS
Incomplete cleanup in a firmware subsystem for Intel(R) SPS before versions SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0 may allow a privileged user to potentially enable denial of service via local access.
AI Analysis
Technical Summary
CVE-2022-26074 is a vulnerability identified in Intel(R) SPS (Server Platform Services), a firmware subsystem used in Intel server platforms to manage various low-level system functions. The issue arises due to incomplete cleanup processes within the firmware subsystem in versions prior to SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0. This incomplete cleanup can be exploited by a privileged local user to trigger a denial of service (DoS) condition. Specifically, the vulnerability allows a user with high privileges on the local system to cause the SPS firmware to enter a state where it becomes unresponsive or otherwise disrupts normal server operations. The vulnerability is classified under CWE-459 (Incomplete Cleanup), indicating that residual data or state left uncleared can be manipulated to cause adverse effects. The CVSS v3.1 base score is 4.4, reflecting a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) but high privileges (PR:H) and no user interaction (UI:N). The impact affects availability only (A:H), with no confidentiality or integrity impact. No known exploits are reported in the wild, and no patches are linked in the provided data, though updated SPS firmware versions have addressed the issue. This vulnerability is relevant primarily in environments running affected Intel SPS firmware versions, typically in enterprise server hardware where SPS manages critical platform functions.
Potential Impact
For European organizations, particularly those operating data centers, cloud infrastructure, or enterprise servers using Intel platforms with affected SPS firmware versions, this vulnerability poses a risk of local denial of service. While exploitation requires privileged local access, an attacker or malicious insider with such access could disrupt server availability, leading to potential downtime, service interruptions, and operational impacts. This could affect critical business applications, cloud services, or infrastructure management systems. The impact is availability-focused, so confidentiality and integrity of data are not directly threatened. However, service outages can have cascading effects on business continuity and SLAs. Given the reliance on Intel server hardware across European enterprises and cloud providers, the risk is non-negligible, especially in sectors with high availability requirements such as finance, telecommunications, and public services. The absence of known exploits reduces immediate risk, but the presence of a medium severity vulnerability in firmware underscores the need for vigilance and timely patching.
Mitigation Recommendations
European organizations should prioritize updating Intel SPS firmware to versions SPS_E3_04.08.04.330.0 or SPS_E3_04.01.04.530.0 or later, as these versions contain fixes for the vulnerability. Since the vulnerability requires privileged local access, organizations should enforce strict access controls and monitoring on server management interfaces and administrative accounts to prevent unauthorized privilege escalation or misuse. Implementing robust endpoint security and host-based intrusion detection can help detect suspicious local activities. Regular firmware inventory and compliance audits should be conducted to identify and remediate outdated SPS versions. Additionally, organizations should incorporate this vulnerability into their vulnerability management and patching workflows, ensuring coordination between hardware vendors and IT operations teams. In environments where immediate firmware updates are not feasible, limiting privileged user access and isolating critical servers can reduce exploitation risk. Finally, maintaining comprehensive logging and alerting on server management operations can aid in early detection of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Ireland
CVE-2022-26074: denial of service in Intel(R) SPS
Description
Incomplete cleanup in a firmware subsystem for Intel(R) SPS before versions SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0 may allow a privileged user to potentially enable denial of service via local access.
AI-Powered Analysis
Technical Analysis
CVE-2022-26074 is a vulnerability identified in Intel(R) SPS (Server Platform Services), a firmware subsystem used in Intel server platforms to manage various low-level system functions. The issue arises due to incomplete cleanup processes within the firmware subsystem in versions prior to SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0. This incomplete cleanup can be exploited by a privileged local user to trigger a denial of service (DoS) condition. Specifically, the vulnerability allows a user with high privileges on the local system to cause the SPS firmware to enter a state where it becomes unresponsive or otherwise disrupts normal server operations. The vulnerability is classified under CWE-459 (Incomplete Cleanup), indicating that residual data or state left uncleared can be manipulated to cause adverse effects. The CVSS v3.1 base score is 4.4, reflecting a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) but high privileges (PR:H) and no user interaction (UI:N). The impact affects availability only (A:H), with no confidentiality or integrity impact. No known exploits are reported in the wild, and no patches are linked in the provided data, though updated SPS firmware versions have addressed the issue. This vulnerability is relevant primarily in environments running affected Intel SPS firmware versions, typically in enterprise server hardware where SPS manages critical platform functions.
Potential Impact
For European organizations, particularly those operating data centers, cloud infrastructure, or enterprise servers using Intel platforms with affected SPS firmware versions, this vulnerability poses a risk of local denial of service. While exploitation requires privileged local access, an attacker or malicious insider with such access could disrupt server availability, leading to potential downtime, service interruptions, and operational impacts. This could affect critical business applications, cloud services, or infrastructure management systems. The impact is availability-focused, so confidentiality and integrity of data are not directly threatened. However, service outages can have cascading effects on business continuity and SLAs. Given the reliance on Intel server hardware across European enterprises and cloud providers, the risk is non-negligible, especially in sectors with high availability requirements such as finance, telecommunications, and public services. The absence of known exploits reduces immediate risk, but the presence of a medium severity vulnerability in firmware underscores the need for vigilance and timely patching.
Mitigation Recommendations
European organizations should prioritize updating Intel SPS firmware to versions SPS_E3_04.08.04.330.0 or SPS_E3_04.01.04.530.0 or later, as these versions contain fixes for the vulnerability. Since the vulnerability requires privileged local access, organizations should enforce strict access controls and monitoring on server management interfaces and administrative accounts to prevent unauthorized privilege escalation or misuse. Implementing robust endpoint security and host-based intrusion detection can help detect suspicious local activities. Regular firmware inventory and compliance audits should be conducted to identify and remediate outdated SPS versions. Additionally, organizations should incorporate this vulnerability into their vulnerability management and patching workflows, ensuring coordination between hardware vendors and IT operations teams. In environments where immediate firmware updates are not feasible, limiting privileged user access and isolating critical servers can reduce exploitation risk. Finally, maintaining comprehensive logging and alerting on server management operations can aid in early detection of exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2022-03-02T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdc116
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:42:26 PM
Last updated: 8/14/2025, 11:33:47 AM
Views: 12
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.