Potential security vulnerabilities in the Intel® Quartus Prime Pro and Standard edition software may allow escalation of privilege or information disclosure. Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2022-27187****
Description: Uncontrolled search path element in the Intel® Quartus Prime Standard edition software before version 21.1 Patch 0.02std may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2022-27233
Description: XML injection in the Quartus® Prime Programmer included in the Intel® Quartus Prime Pro and Standard edition software may allow an unauthenticated user to potentially enable information disclosure via network access.
CVSS Base Score: 6.5 Medium
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N****
Intel® Quartus Prime Programmer Pro edition software before version 22.1.
Intel® Quartus Prime Programmer Standard edition software before version 21.1 Patch 0.02std.
Intel® Quartus Prime Pro edition software before version 22.1.
Intel® Quartus Prime Standard edition software before version 21.1 Patch 0.02std.
Intel recommends updating the Intel® Quartus Prime Pro edition software to version 22.1 or later.
Intel recommends updating the Intel® Quartus Prime Standard edition software to version 21.1 Patch 0.02std or later.
Updates are available for download at these locations:
<http://fpgasoftware.intel.com/?edition=pro>
<http://fpgasoftware.intel.com/?edition=standard>
Intel would like to thank Julien Ahrens from RCE Security (CVE-2022-27187) for reporting this issue.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.