Lucene search

K
intelIntel Security CenterINTEL:INTEL-SA-00843
HistoryNov 14, 2023 - 12:00 a.m.

Intel® Battery Life Diagnostic Tool Software Advisory

2023-11-1400:00:00
Intel Security Center
www.intel.com
5
vulnerabilities
escalation of privilege
intel® battery life diagnostic tool
advisory
cve-2023-34430
cve-2023-32662
cve-2022-38786
software updates
version 2.2.1
affected products
recommendation
acknowledgements
coordinated disclosure

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Summary:

Potential security vulnerabilities in some Intel® Battery Life Diagnostic Tool software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities.

Vulnerability Details:

CVEID: CVE-2023-34430

Description: Uncontrolled search path in some Intel® Battery Life Diagnostic Tool software before version 2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS Base Score: 6.7 Medium

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

CVEID: CVE-2023-32662

Description: Improper authorization in some Intel® Battery Life Diagnostic Tool installation software before version 2.2.1 may allow a privilaged user to potentially enable escalation of privilege via local access.

CVSS Base Score: 6.7 Medium

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVEID: CVE-2022-38786

Description: Improper access control in some Intel® Battery Life Diagnostic Tool software before version 2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS Base Score: 6.7 Medium

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

Affected Products:

Intel® Battery Life Diagnostic Tool software before version 2.2.1.

Recommendation:

Intel recommends updating Intel® Battery Life Diagnostic Tool software to version 2.2.1 or later.

Updates are available for download at this location:<https://cdrdv2.intel.com/v1/dl/getContent/777224/782477&gt;

Acknowledgements:

Intel would like to thank ycdxsb of VARAS@IIE (CVE-2023-34430), Marius Gabriel Mihai (CVE-2023-32662) and Aobo Wang of Chaitin Security Research Lab (CVE-2022-38786) for reporting these issues.

Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for INTEL:INTEL-SA-00843