Lucene search

K
cve[email protected]CVE-2023-27887
HistoryAug 11, 2023 - 3:15 a.m.

CVE-2023-27887

2023-08-1103:15:24
CWE-665
web.nvd.nist.gov
17
bios
firmware
vulnerability
intel(r) nucs
information disclosure
local access
cve-2023-27887
nvd

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N

4.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Improper initialization in BIOS firmware for some Intelยฎ NUCs may allow a privileged user to potentially enable information disclosure via local access.

Affected configurations

NVD
Node
intelnuc_11_pro_kit_nuc11tnhi70z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi70zMatch-
Node
intelnuc_11_pro_kit_nuc11tnki70z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki70zMatch-
Node
intelnuc_11_pro_kit_nuc11tnki30z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki30zMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi30z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi30zMatch-
Node
intelnuc_11_pro_kit_nuc11tnki50z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki50zMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi50z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi50zMatch-
Node
intelnuc_11_pro_board_nuc11tnbi30z_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi30zMatch-
Node
intelnuc_11_pro_board_nuc11tnbi50z_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi50zMatch-
Node
intelnuc_11_pro_board_nuc11tnbi70z_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi70zMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi3_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi3Match-
Node
intelnuc_11_pro_kit_nuc11tnhi5_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi5Match-
Node
intelnuc_11_pro_kit_nuc11tnhi7_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi7Match-
Node
intelnuc_11_pro_kit_nuc11tnki3_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki3Match-
Node
intelnuc_11_pro_kit_nuc11tnki5_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki5Match-
Node
intelnuc_11_pro_kit_nuc11tnki7_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki7Match-
Node
intelnuc_11_pro_board_nuc11tnbi3_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi3Match-
Node
intelnuc_11_pro_board_nuc11tnbi5_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi5Match-
Node
intelnuc_11_pro_board_nuc11tnbi7_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi7Match-
Node
intelnuc_11_pro_kit_nuc11tnhi50w_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi50wMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi50l_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi50lMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi30l_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi30lMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi70q_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi70qMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi30p_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi30pMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi70l_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi70lMatch-

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Intel(R) NUCs",
    "versions": [
      {
        "version": "See references",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N

4.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2023-27887