Skip to main content

CVE-2022-26074: denial of service in Intel(R) SPS

Medium
VulnerabilityCVE-2022-26074cvecve-2022-26074
Published: Thu Aug 18 2022 (08/18/2022, 19:56:02 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) SPS

Description

Incomplete cleanup in a firmware subsystem for Intel(R) SPS before versions SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0 may allow a privileged user to potentially enable denial of service via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 23:42:26 UTC

Technical Analysis

CVE-2022-26074 is a vulnerability identified in Intel(R) SPS (Server Platform Services), a firmware subsystem used in Intel server platforms to manage various low-level system functions. The issue arises due to incomplete cleanup processes within the firmware subsystem in versions prior to SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0. This incomplete cleanup can be exploited by a privileged local user to trigger a denial of service (DoS) condition. Specifically, the vulnerability allows a user with high privileges on the local system to cause the SPS firmware to enter a state where it becomes unresponsive or otherwise disrupts normal server operations. The vulnerability is classified under CWE-459 (Incomplete Cleanup), indicating that residual data or state left uncleared can be manipulated to cause adverse effects. The CVSS v3.1 base score is 4.4, reflecting a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) but high privileges (PR:H) and no user interaction (UI:N). The impact affects availability only (A:H), with no confidentiality or integrity impact. No known exploits are reported in the wild, and no patches are linked in the provided data, though updated SPS firmware versions have addressed the issue. This vulnerability is relevant primarily in environments running affected Intel SPS firmware versions, typically in enterprise server hardware where SPS manages critical platform functions.

Potential Impact

For European organizations, particularly those operating data centers, cloud infrastructure, or enterprise servers using Intel platforms with affected SPS firmware versions, this vulnerability poses a risk of local denial of service. While exploitation requires privileged local access, an attacker or malicious insider with such access could disrupt server availability, leading to potential downtime, service interruptions, and operational impacts. This could affect critical business applications, cloud services, or infrastructure management systems. The impact is availability-focused, so confidentiality and integrity of data are not directly threatened. However, service outages can have cascading effects on business continuity and SLAs. Given the reliance on Intel server hardware across European enterprises and cloud providers, the risk is non-negligible, especially in sectors with high availability requirements such as finance, telecommunications, and public services. The absence of known exploits reduces immediate risk, but the presence of a medium severity vulnerability in firmware underscores the need for vigilance and timely patching.

Mitigation Recommendations

European organizations should prioritize updating Intel SPS firmware to versions SPS_E3_04.08.04.330.0 or SPS_E3_04.01.04.530.0 or later, as these versions contain fixes for the vulnerability. Since the vulnerability requires privileged local access, organizations should enforce strict access controls and monitoring on server management interfaces and administrative accounts to prevent unauthorized privilege escalation or misuse. Implementing robust endpoint security and host-based intrusion detection can help detect suspicious local activities. Regular firmware inventory and compliance audits should be conducted to identify and remediate outdated SPS versions. Additionally, organizations should incorporate this vulnerability into their vulnerability management and patching workflows, ensuring coordination between hardware vendors and IT operations teams. In environments where immediate firmware updates are not feasible, limiting privileged user access and isolating critical servers can reduce exploitation risk. Finally, maintaining comprehensive logging and alerting on server management operations can aid in early detection of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2022-03-02T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdc116

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 11:42:26 PM

Last updated: 8/14/2025, 11:33:47 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats