Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.INTEL_SA_00924_CVE-2023-22329.NASL
HistoryDec 13, 2023 - 12:00 a.m.

Intel BIOS Firmware CVE-2023-22329 (INTEL-SA-00924)

2023-12-1300:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
11
intel
bios
firmware
cve-2023-22329
intel-sa-00924
vulnerability
denial of service

CVSS3

3.5

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

AI Score

7.2

Confidence

High

EPSS

0

Percentile

9.0%

The version of the Intel BIOS on the remote device is affected by a vulnerability as identified in the INTEL-SA-00924 advisory.

  • Improper input validation in the BIOS firmware for some Intelยฎ Processors may allow an authenticated user to potentially enable denial of service via adjacent access. (CVE-2023-22329)

Note that Nessus has not tested for this issue but has instead relied only on the applicationโ€™s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(186832);
  script_version("1.0");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/13");

  script_cve_id("CVE-2023-22329");

  script_name(english:"Intel BIOS Firmware CVE-2023-22329 (INTEL-SA-00924)");

  script_set_attribute(attribute:"synopsis", value:
"The BIOS firmware on the remote host is affected by CVE-2023-22329.");
  script_set_attribute(attribute:"description", value:
"The version of the Intel BIOS on the remote device is affected by a vulnerability as identified in the INTEL-SA-00924
advisory.

  - Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated
    user to potentially enable denial of service via adjacent access. (CVE-2023-22329)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  # https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00924.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d852c5da");
  script_set_attribute(attribute:"solution", value:
"Contact your system OEM for updated firmware per the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-22329");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"vendor_severity", value:"MEDIUM");

  script_set_attribute(attribute:"vuln_publication_date", value:"2023/11/14");
  script_set_attribute(attribute:"patch_publication_date", value:"2023/11/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/12/13");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("intel_cpuid_detection.nbin");
  script_require_keys("SMB/WMI/Available", "Settings/ParanoidReport");

  exit(0);
}

if (report_paranoia < 2) audit(AUDIT_PARANOID);

var processor_id = get_kb_item_or_exit('Host/cpu/cpuid');

var vuln_processors = [
  {
    'Product Collection': 'Intel Atom: x6211E, x6413E, x6425E, x6212RE, x6414RE, x6425RE, x6427FE, x6200FE; Intel Celeron: J6413, N6211; Intel Pentium: J6425, N6415',
    'CPU ID': [
      '90661'
    ],
    'CVE ID': 'CVE-2023-22329',
    'Platform ID': 'C2'
  },
  {
    'Product Collection': '8th Generation Intel Core Processor Family, 9th Generation Intel Core Processor Family, Intel Celeron Processor G Series, Intel Pentium Gold Processor Series',
    'CPU ID': [
      '806EA',
      '906EA',
      '906EB',
      '906EC',
      '906ED'
    ],
    'CVE ID': 'CVE-2023-22329',
    'Platform ID': '22 C0'
  },
  {
    'Product Collection': '10th Generation Intel Core Processor Family',
    'CPU ID': [
      '806EC',
      'A0652',
      'A0653',
      'A0655',
      'A0660',
      'A0661'
    ],
    'CVE ID': 'CVE-2023-22329',
    'Platform ID': '01 02 22 80 94'
  },
  {
    'Product Collection': '10th Generation Intel Core Processor Family',
    'CPU ID': [
      '706E5'
    ],
    'CVE ID': 'CVE-2023-22329',
    'Platform ID': '80'
  },
  {
    'Product Collection': 'Intel Core: i7-11700T, i7-11700; i5-11400T, i5-11400, i5-11500T, i5-11500',
    'CPU ID': [
      'A0671'
    ],
    'CVE ID': 'CVE-2023-22329',
    'Platform ID': '02'
  },
  {
    'Product Collection': '11th Generation Intel Core Processor Family',
    'CPU ID': [
      '806C1',
      '806C2',
      '806D1'
    ],
    'CVE ID': 'CVE-2023-22329',
    'Platform ID': '80 C2'
  },
  {
    'Product Collection': '12th Generation Intel Core Processor Family, Intel Celeron Processor Family, Intel Pentium Gold Processor Family',
    'CPU ID': [
      '90672',
      '90675',
      '906A3',
      '906A4'
    ],
    'CVE ID': 'CVE-2023-22329',
    'Platform ID': '01 07 80'
  },
  {
    'Product Collection': '12th Generation Intel Core Processor Family, Intel Celeron Processor Family, Intel Pentium Gold Processor Family',
    'CPU ID': [
      'B06E0'
    ],
    'CVE ID': 'CVE-2023-22329',
    'Platform ID': '01'
  },
  {
    'Product Collection': '13th Generation Intel Core Processor Family, Intel Celeron Processor Family, Intel Pentium Gold Processor Family',
    'CPU ID': [
      'B0671',
      'B06F2',
      'B06F5'
    ],
    'CVE ID': 'CVE-2023-22329',
    'Platform ID': '01'
  },
  {
    'Product Collection': '8th Generation Intel Core Processors',
    'CPU ID': [
      '806EB',
      '806EC'
    ],
    'CVE ID': 'CVE-2023-22329',
    'Platform ID': '94 D0'
  }
];

var cpuids, report = FALSE;
foreach (var processor in vuln_processors)
{
  cpuids = processor['CPU ID'];
  foreach (var cpuid in cpuids)
  {
    if (processor_id == cpuid)
    {
      report  = 'Installed CPU ID : ' + cpuid + '\n';
      report += 'Installed CPU(s) : ' + processor['Product Collection'] + '\n';
      security_report_v4(port:135, severity:SECURITY_NOTE, extra:report);
      exit(0);
    }
  }
}

audit(AUDIT_INST_VER_NOT_VULN, 'The Intelร‚ยฎ processor');

CVSS3

3.5

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

AI Score

7.2

Confidence

High

EPSS

0

Percentile

9.0%

Related for INTEL_SA_00924_CVE-2023-22329.NASL