Lucene search

K
cve[email protected]CVE-2023-30768
HistoryMay 12, 2023 - 3:15 p.m.

CVE-2023-30768

2023-05-1215:15:09
CWE-284
web.nvd.nist.gov
9
cve-2023-30768
intel server board
s2600wtt
access control
bios
privileged user
escalation of privilege
nvd

7.7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

Improper access control in the Intel® Server Board S2600WTT belonging to the Intel® Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.

Affected configurations

NVD
Node
intelserver_board_s1200v3rpl_firmwareRange<0006
AND
intelserver_board_s1200v3rplMatch-
Node
intelserver_board_s1200v3rpm_firmwareRange<0006
AND
intelserver_board_s1200v3rpmMatch-
Node
intelserver_board_s1200v3rpo_firmwareRange<0006
AND
intelserver_board_s1200v3rpoMatch-
Node
intelserver_board_s1200v3rps_firmwareRange<0006
AND
intelserver_board_s1200v3rpsMatch-
Node
intelserver_board_s1400fp2_firmwareRange<0005
AND
intelserver_board_s1400fp2Match-
Node
intelserver_board_s1400fp4_firmwareRange<0005
AND
intelserver_board_s1400fp4Match-
Node
intelserver_board_s1400sp4_firmwareRange<0005
AND
intelserver_board_s1400sp4Match-
Node
intelserver_board_s1400sp2_firmwareRange<0005
AND
intelserver_board_s1400sp2Match-
Node
intelserver_board_s1600jp2_firmwareRange<0005
AND
intelserver_board_s1600jp2Match-
Node
intelserver_board_s1600jp4_firmwareRange<0005
AND
intelserver_board_s1600jp4Match-
Node
intelserver_board_s2400bb4_firmwareRange<0005
AND
intelserver_board_s2400bb4Match-
Node
intelserver_board_s2400bb4_firmwareRange<0005
AND
intelserver_board_s2400bb4Match-
Node
intelserver_board_s2400ep2_firmwareRange<0005
AND
intelserver_board_s2400ep2Match-
Node
intelserver_board_s2400ep4_firmwareRange<0005
AND
intelserver_board_s2400ep4Match-
Node
intelserver_board_s2400sc2_firmwareRange<0005
AND
intelserver_board_s2400sc2Match-
Node
intelserver_board_s2600co4_firmwareRange<0005
AND
intelserver_board_s2600co4Match-
Node
intelserver_board_s2600coe_firmwareRange<0005
AND
intelserver_board_s2600coeMatch-
Node
intelserver_board_s2600coeioc_firmwareRange<0005
AND
intelserver_board_s2600coeiocMatch-
Node
intelserver_board_s2600cp2_firmwareRange<0005
AND
intelserver_board_s2600cp2Match-
Node
intelserver_board_s2600cp2ioc_firmwareRange<0005
AND
intelserver_board_s2600cp2iocMatch-
Node
intelserver_board_s2600cp2j_firmwareRange<0005
AND
intelserver_board_s2600cp2jMatch-
Node
intelserver_board_s2600cp4_firmwareRange<0005
AND
intelserver_board_s2600cp4Match-
Node
intelserver_board_s2600cp4ioc_firmwareRange<0005
AND
intelserver_board_s2600cp4iocMatch-
Node
intelserver_board_s2600gl_firmwareRange<0005
AND
intelserver_board_s2600glMatch-
Node
intelserver_board_s2600gz_firmwareRange<0005
AND
intelserver_board_s2600gzMatch-
Node
intelserver_board_s2600ip4_firmwareRange<0005
AND
intelserver_board_s2600ip4Match-
Node
intelserver_board_s2600ip4l_firmwareRange<0005
AND
intelserver_board_s2600ip4lMatch-
Node
intelworkstation_board_w2600cr2_firmwareRange<0005
AND
intelworkstation_board_w2600cr2Match-
Node
intelworkstation_board_w2600cr2l_firmwareRange<0005
AND
intelworkstation_board_w2600cr2lMatch-
Node
intelserver_board_s2600jf_firmwareRange<0005
AND
intelserver_board_s2600jfMatch-
Node
intelserver_board_s2600wp_firmwareRange<0005
AND
intelserver_board_s2600wpMatch-
Node
intelserver_board_s4600lh2_firmwareRange<0005
AND
intelserver_board_s4600lh2Match-
Node
intelserver_board_s4600lt2_firmwareRange<0005
AND
intelserver_board_s4600lt2Match-
Node
intelserver_board_s2600wpf_firmwareRange<0005
AND
intelserver_board_s2600wpfMatch-
Node
intelserver_board_s2600wpq_firmwareRange<0005
AND
intelserver_board_s2600wpqMatch-
Node
intelserver_board_s2600jff_firmwareRange<0005
AND
intelserver_board_s2600jffMatch-
Node
intelserver_board_s2600jfq_firmwareRange<0005
AND
intelserver_board_s2600jfqMatch-
Node
intelserver_board_s2600cw2r_firmwareRange<0018
AND
intelserver_board_s2600cw2rMatch-
Node
intelserver_board_s2600cw2sr_firmwareRange<0018
AND
intelserver_board_s2600cw2srMatch-
Node
intelserver_board_s2600cwtr_firmwareRange<0018
AND
intelserver_board_s2600cwtrMatch-
Node
intelserver_board_s2600cwtsr_firmwareRange<0018
AND
intelserver_board_s2600cwtsrMatch-
Node
intelserver_board_s2600cw2s_firmwareRange<0018
AND
intelserver_board_s2600cw2sMatch-
Node
intelserver_board_s2600cwt_firmwareRange<0018
AND
intelserver_board_s2600cwtMatch-
Node
intelserver_board_s2600cwts_firmwareRange<0018
AND
intelserver_board_s2600cwtsMatch-
Node
intelserver_board_s2600cw2_firmwareRange<0018
AND
intelserver_board_s2600cw2Match-
Node
intelserver_board_s2600kpfr_firmwareRange<0018
AND
intelserver_board_s2600kpfrMatch-
Node
intelserver_board_s2600kpr_firmwareRange<0018
AND
intelserver_board_s2600kprMatch-
Node
intelserver_board_s2600kptr_firmwareRange<0018
AND
intelserver_board_s2600kptrMatch-
Node
intelserver_board_s2600kp_firmwareRange<0018
AND
intelserver_board_s2600kpMatch-
Node
intelserver_board_s2600kpf_firmwareRange<0018
AND
intelserver_board_s2600kpfMatch-
Node
intelserver_board_s2600tpnr_firmwareRange<0018
AND
intelserver_board_s2600tpnrMatch-
Node
intelserver_board_s2600tpfr_firmwareRange<0018
AND
intelserver_board_s2600tpfrMatch-
Node
intelserver_board_s2600tpr_firmwareRange<0018
AND
intelserver_board_s2600tprMatch-
Node
intelserver_board_s2600tpf_firmwareRange<0018
AND
intelserver_board_s2600tpfMatch-
Node
intelserver_board_s2600tp_firmwareRange<0018
AND
intelserver_board_s2600tpMatch-
Node
intelserver_board_s2600wtts1r_firmwareRange<0018
AND
intelserver_board_s2600wtts1rMatch-
Node
intelserver_board_s2600wt2r_firmwareRange<0018
AND
intelserver_board_s2600wt2rMatch-
Node
intelserver_board_s2600wttr_firmwareRange<0018
AND
intelserver_board_s2600wttrMatch-
Node
intelserver_board_s2600wt2_firmwareRange<0018
AND
intelserver_board_s2600wt2Match-
Node
intelserver_board_s2600wtt_firmwareRange<0018
AND
intelserver_board_s2600wttMatch-
Node
intelserver_board_s1200btlrm_firmwareRange<0044
AND
intelserver_board_s1200btlrmMatch-
Node
intelserver_board_s1200btlr_firmwareRange<0044
AND
intelserver_board_s1200btlrMatch-
Node
intelserver_board_s1200btsr_firmwareRange<0044
AND
intelserver_board_s1200btsrMatch-
Node
intelserver_board_s1200btl_firmwareRange<0044
AND
intelserver_board_s1200btlMatch-
Node
intelserver_board_s1200bts_firmwareRange<0044
AND
intelserver_board_s1200btsMatch-

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family",
    "versions": [
      {
        "version": "BIOS version 0016",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2023-30768