Lucene search

K
cveIntelCVE-2023-31273
HistoryNov 14, 2023 - 7:15 p.m.

CVE-2023-31273

2023-11-1419:15:24
CWE-269
CWE-693
intel
web.nvd.nist.gov
56
cve-2023-31273
intel
dcm
software
protection mechanism
vulnerability
privilege escalation
network access

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.001

Percentile

42.1%

Protection mechanism failure in some Intel DCM software before version 5.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

Affected configurations

Nvd
Vulners
Node
inteldata_center_managerRange<5.2
VendorProductVersionCPE
inteldata_center_manager*cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Intel DCM software",
    "versions": [
      {
        "version": "before version 5.2",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.001

Percentile

42.1%

Related for CVE-2023-31273