Lucene search

K
vulnrichmentIntelVULNRICHMENT:CVE-2024-34163
HistoryAug 14, 2024 - 1:45 p.m.

CVE-2024-34163

2024-08-1413:45:38
CWE-20
intel
github.com
1
intel nuc
firmware
input validation
privilege escalation

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

CVSS4

8.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Improper input validation in firmware for some Intel® NUC may allow a privileged user to potentially enableescalation of privilege via local access.

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Intel(R) NUC",
    "versions": [
      {
        "version": "See references",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:intel:lapac71g_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "lapac71g_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "0065",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:intel:lapac71h_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "lapac71h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "0065",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:intel:lapbc510_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "lapbc510_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "0083",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:intel:lapbc710_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "lapbc710_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "0083",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:intel:laprc510_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "laprc510_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "0066",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:intel:laprc710_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "laprc710_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "0066",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:intel:lapkc51e_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "lapkc51e_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "0048",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:intel:lapkc71e_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "lapkc71e_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "0048",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:intel:lapkc71f_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "lapkc71f_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "0048",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

CVSS4

8.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-34163