Lucene search

K
cve[email protected]CVE-2023-29494
HistoryAug 11, 2023 - 3:15 a.m.

CVE-2023-29494

2023-08-1103:15:30
CWE-20
web.nvd.nist.gov
18
cve-2023-29494
bios firmware
intel nucs
input validation
privilege escalation
local access
nvd

7.5 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

Improper input validation in BIOS firmware for some Intelยฎ NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Affected configurations

NVD
Node
intelnuc_11_pro_kit_nuc11tnhi70z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi70zMatch-
Node
intelnuc_11_pro_kit_nuc11tnki70z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki70zMatch-
Node
intelnuc_11_pro_kit_nuc11tnki30z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki30zMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi30z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi30zMatch-
Node
intelnuc_11_pro_kit_nuc11tnki50z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki50zMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi50z_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi50zMatch-
Node
intelnuc_11_pro_board_nuc11tnbi30z_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi30zMatch-
Node
intelnuc_11_pro_board_nuc11tnbi50z_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi50zMatch-
Node
intelnuc_11_pro_board_nuc11tnbi70z_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi70zMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi3_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi3Match-
Node
intelnuc_11_pro_kit_nuc11tnhi5_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi5Match-
Node
intelnuc_11_pro_kit_nuc11tnhi7_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi7Match-
Node
intelnuc_11_pro_kit_nuc11tnki3_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki3Match-
Node
intelnuc_11_pro_kit_nuc11tnki5_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki5Match-
Node
intelnuc_11_pro_kit_nuc11tnki7_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnki7Match-
Node
intelnuc_11_pro_board_nuc11tnbi3_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi3Match-
Node
intelnuc_11_pro_board_nuc11tnbi5_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi5Match-
Node
intelnuc_11_pro_board_nuc11tnbi7_firmwareMatch-
AND
intelnuc_11_pro_board_nuc11tnbi7Match-
Node
intelnuc_11_pro_kit_nuc11tnhi50w_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi50wMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi50l_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi50lMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi30l_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi30lMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi70q_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi70qMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi30p_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi30pMatch-
Node
intelnuc_11_pro_kit_nuc11tnhi70l_firmwareMatch-
AND
intelnuc_11_pro_kit_nuc11tnhi70lMatch-

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Intel(R) NUCs",
    "versions": [
      {
        "version": "See references",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.5 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2023-29494