ID

VAR-201704-0655


CVE

CVE-2017-5684


TITLE

Intel Compute Stick system's BIOS Vulnerabilities that gain access

Trust: 0.8

sources: JVNDB: JVNDB-2017-002978

DESCRIPTION

The BIOS in Intel Compute Stick systems based on 6th Gen Intel Core processors prior to version CC047 may allow an attacker with physical access to the system to gain access to personal information. IntelNUC is Intel's micro PC, which is equivalent to a small desktop, allowing you to work, study and play in any room. A local information disclosure vulnerability exists in IntelNUC and ComputeStickDCI. Intel NUC and Compute Stick are prone to multiple local information-disclosure vulnerabilities. Note: This issue was previously titled 'Intel NUC and Compute Stick DCI CVE-2017-5685 Local Information Disclosure Vulnerability'. The title and technical details have been changed to better reflect the vulnerability impact. BIOS is one of the basic input input systems

Trust: 2.52

sources: NVD: CVE-2017-5684 // JVNDB: JVNDB-2017-002978 // CNVD: CNVD-2017-10730 // BID: 97408 // VULHUB: VHN-113887

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-10730

AFFECTED PRODUCTS

vendor:intelmodel:stk2mv64cc biosscope:lteversion:ccsklm5v.86a.0046.2017.0105.1608

Trust: 1.0

vendor:intelmodel:compute stick stk2mv64ccscope:ltversion:cc047 (bios - i6 ccsklm5v.86a)

Trust: 0.8

vendor:intelmodel:compute stick systems based on 6th gen intel core processors <cc047scope: - version: -

Trust: 0.6

vendor:intelmodel:stk2mv64cc biosscope:eqversion:ccsklm5v.86a.0046.2017.0105.1608

Trust: 0.6

vendor:intelmodel:nuc6i7kykscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc6i5syh/kscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc6i3syh/kscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stk2mv64ccscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc6i7kyk ky0045scope:neversion: -

Trust: 0.3

vendor:intelmodel:nuc6i5syh/k sy0059scope:neversion: -

Trust: 0.3

vendor:intelmodel:nuc6i3syh/k sy0059scope:neversion: -

Trust: 0.3

vendor:intelmodel:compute stick stk2mv64cc cc0047scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2017-10730 // BID: 97408 // JVNDB: JVNDB-2017-002978 // NVD: CVE-2017-5684 // CNNVD: CNNVD-201704-153

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2017-5684
value: LOW

Trust: 1.8

CNVD: CNVD-2017-10730
value: LOW

Trust: 0.6

CNNVD: CNNVD-201704-153
value: LOW

Trust: 0.6

VULHUB: VHN-113887
value: LOW

Trust: 0.1

NVD:
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: TRUE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2017-5684
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2017-10730
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-113887
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: LOW
baseScore: 3.9
vectorString: CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 0.3
impactScore: 3.6
version: 3.0

Trust: 1.0

NVD: CVE-2017-5684
baseSeverity: LOW
baseScore: 3.9
vectorString: CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2017-10730 // VULHUB: VHN-113887 // JVNDB: JVNDB-2017-002978 // NVD: CVE-2017-5684 // CNNVD: CNNVD-201704-153

PROBLEMTYPE DATA

problemtype:CWE-276

Trust: 1.1

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-113887 // JVNDB: JVNDB-2017-002978 // NVD: CVE-2017-5684

THREAT TYPE

local

Trust: 0.9

sources: BID: 97408 // CNNVD: CNNVD-201704-153

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201704-153

CONFIGURATIONS

sources: NVD: CVE-2017-5684

PATCH

title:INTEL-SA-00073url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00073&languageid=en-fr

Trust: 0.8

title:Patch for IntelNUC and ComputeStickDCI Local Information Disclosure Vulnerability (CNVD-2017-10730)url:https://www.cnvd.org.cn/patchinfo/show/96213

Trust: 0.6

title:Intel NUC systems based on 6th Gen Intel Core BIOS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=73791

Trust: 0.6

sources: CNVD: CNVD-2017-10730 // JVNDB: JVNDB-2017-002978 // CNNVD: CNNVD-201704-153

EXTERNAL IDS

db:NVDid:CVE-2017-5684

Trust: 3.4

db:BIDid:97408

Trust: 0.9

db:JVNDBid:JVNDB-2017-002978

Trust: 0.8

db:CNNVDid:CNNVD-201704-153

Trust: 0.7

db:CNVDid:CNVD-2017-10730

Trust: 0.6

db:VULHUBid:VHN-113887

Trust: 0.1

sources: CNVD: CNVD-2017-10730 // VULHUB: VHN-113887 // BID: 97408 // JVNDB: JVNDB-2017-002978 // NVD: CVE-2017-5684 // CNNVD: CNNVD-201704-153

REFERENCES

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00073&languageid=en-fr

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2017-5684

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5684

Trust: 0.8

url:http://www.securityfocus.com/bid/97408

Trust: 0.6

url:http://www.intel.com/content/www/us/en/homepage.html

Trust: 0.3

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00073&amp;languageid=en-fr

Trust: 0.1

sources: CNVD: CNVD-2017-10730 // VULHUB: VHN-113887 // BID: 97408 // JVNDB: JVNDB-2017-002978 // NVD: CVE-2017-5684 // CNNVD: CNNVD-201704-153

CREDITS

Maxim Goryachy and Mark Ermolov of Positive Technologies.

Trust: 0.3

sources: BID: 97408

SOURCES

db:CNVDid:CNVD-2017-10730
db:VULHUBid:VHN-113887
db:BIDid:97408
db:JVNDBid:JVNDB-2017-002978
db:NVDid:CVE-2017-5684
db:CNNVDid:CNNVD-201704-153

LAST UPDATE DATE

2023-12-18T12:37:29.153000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-10730date:2017-06-22T00:00:00
db:VULHUBid:VHN-113887date:2019-10-03T00:00:00
db:BIDid:97408date:2017-04-11T00:03:00
db:JVNDBid:JVNDB-2017-002978date:2017-05-10T00:00:00
db:NVDid:CVE-2017-5684date:2019-10-03T00:03:26.223
db:CNNVDid:CNNVD-201704-153date:2019-10-23T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-10730date:2017-06-22T00:00:00
db:VULHUBid:VHN-113887date:2017-04-03T00:00:00
db:BIDid:97408date:2017-04-03T00:00:00
db:JVNDBid:JVNDB-2017-002978date:2017-05-10T00:00:00
db:NVDid:CVE-2017-5684date:2017-04-03T21:59:00.187
db:CNNVDid:CNNVD-201704-153date:2017-04-03T00:00:00