ID

VAR-201704-0656


CVE

CVE-2017-5685


TITLE

Intel NUC system's BIOS Vulnerabilities that gain access

Trust: 0.8

sources: JVNDB: JVNDB-2017-002979

DESCRIPTION

The BIOS in Intel NUC systems based on 6th Gen Intel Core processors prior to version KY0045 may allow may allow an attacker with physical access to the system to gain access to personal information. IntelNUC is Intel's micro PC, which is equivalent to a small desktop, allowing you to work, study and play in any room. A local information disclosure vulnerability exists in IntelNUC and ComputeStickDCI. Intel NUC and Compute Stick are prone to multiple local information-disclosure vulnerabilities. Note: This issue was previously titled 'Intel NUC and Compute Stick DCI CVE-2017-5685 Local Information Disclosure Vulnerability'. The title and technical details have been changed to better reflect the vulnerability impact. BIOS is one of the basic input input systems

Trust: 2.52

sources: NVD: CVE-2017-5685 // JVNDB: JVNDB-2017-002979 // CNVD: CNVD-2017-10729 // BID: 97408 // VULHUB: VHN-113888

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-10729

AFFECTED PRODUCTS

vendor:intelmodel:nuc6i7kyk biosscope:eqversion:kyskli70.86a.0042.2016.0929.1933

Trust: 1.6

vendor:intelmodel:nuc kit nuc6i7kykscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc systems based on 6th gen intel core processors <ky0045scope: - version: -

Trust: 0.6

vendor:intelmodel:nuc6i7kykscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc6i5syh/kscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc6i3syh/kscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stk2mv64ccscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc6i7kyk ky0045scope:neversion: -

Trust: 0.3

vendor:intelmodel:nuc6i5syh/k sy0059scope:neversion: -

Trust: 0.3

vendor:intelmodel:nuc6i3syh/k sy0059scope:neversion: -

Trust: 0.3

vendor:intelmodel:compute stick stk2mv64cc cc0047scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2017-10729 // BID: 97408 // JVNDB: JVNDB-2017-002979 // NVD: CVE-2017-5685 // CNNVD: CNNVD-201704-152

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2017-5685
value: LOW

Trust: 1.8

CNVD: CNVD-2017-10729
value: LOW

Trust: 0.6

CNNVD: CNNVD-201704-152
value: LOW

Trust: 0.6

VULHUB: VHN-113888
value: LOW

Trust: 0.1

NVD:
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: TRUE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2017-5685
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2017-10729
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-113888
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: LOW
baseScore: 3.9
vectorString: CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 0.3
impactScore: 3.6
version: 3.0

Trust: 1.0

NVD: CVE-2017-5685
baseSeverity: LOW
baseScore: 3.9
vectorString: CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2017-10729 // VULHUB: VHN-113888 // JVNDB: JVNDB-2017-002979 // NVD: CVE-2017-5685 // CNNVD: CNNVD-201704-152

PROBLEMTYPE DATA

problemtype:CWE-276

Trust: 1.1

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-113888 // JVNDB: JVNDB-2017-002979 // NVD: CVE-2017-5685

THREAT TYPE

local

Trust: 0.9

sources: BID: 97408 // CNNVD: CNNVD-201704-152

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201704-152

CONFIGURATIONS

sources: NVD: CVE-2017-5685

PATCH

title:INTEL-SA-00073url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00073&languageid=en-fr

Trust: 0.8

title:Patch for IntelNUC and ComputeStickDCI Local Information Disclosure Vulnerabilitiesurl:https://www.cnvd.org.cn/patchinfo/show/96214

Trust: 0.6

title:Intel NUC systems based on 6th Gen Intel Core BIOS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=73790

Trust: 0.6

sources: CNVD: CNVD-2017-10729 // JVNDB: JVNDB-2017-002979 // CNNVD: CNNVD-201704-152

EXTERNAL IDS

db:NVDid:CVE-2017-5685

Trust: 3.4

db:BIDid:97408

Trust: 2.6

db:JVNDBid:JVNDB-2017-002979

Trust: 0.8

db:CNNVDid:CNNVD-201704-152

Trust: 0.7

db:CNVDid:CNVD-2017-10729

Trust: 0.6

db:VULHUBid:VHN-113888

Trust: 0.1

sources: CNVD: CNVD-2017-10729 // VULHUB: VHN-113888 // BID: 97408 // JVNDB: JVNDB-2017-002979 // NVD: CVE-2017-5685 // CNNVD: CNNVD-201704-152

REFERENCES

url:http://www.securityfocus.com/bid/97408

Trust: 2.3

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00073&languageid=en-fr

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2017-5685

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5685

Trust: 0.8

url:http://www.intel.com/content/www/us/en/homepage.html

Trust: 0.3

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00073&amp;languageid=en-fr

Trust: 0.1

sources: CNVD: CNVD-2017-10729 // VULHUB: VHN-113888 // BID: 97408 // JVNDB: JVNDB-2017-002979 // NVD: CVE-2017-5685 // CNNVD: CNNVD-201704-152

CREDITS

Maxim Goryachy and Mark Ermolov of Positive Technologies.

Trust: 0.3

sources: BID: 97408

SOURCES

db:CNVDid:CNVD-2017-10729
db:VULHUBid:VHN-113888
db:BIDid:97408
db:JVNDBid:JVNDB-2017-002979
db:NVDid:CVE-2017-5685
db:CNNVDid:CNNVD-201704-152

LAST UPDATE DATE

2023-12-18T12:37:29.186000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-10729date:2017-06-22T00:00:00
db:VULHUBid:VHN-113888date:2019-10-03T00:00:00
db:BIDid:97408date:2017-04-11T00:03:00
db:JVNDBid:JVNDB-2017-002979date:2017-05-10T00:00:00
db:NVDid:CVE-2017-5685date:2019-10-03T00:03:26.223
db:CNNVDid:CNNVD-201704-152date:2019-10-23T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-10729date:2017-06-22T00:00:00
db:VULHUBid:VHN-113888date:2017-04-03T00:00:00
db:BIDid:97408date:2017-04-03T00:00:00
db:JVNDBid:JVNDB-2017-002979date:2017-05-10T00:00:00
db:NVDid:CVE-2017-5685date:2017-04-03T21:59:00.220
db:CNNVDid:CNNVD-201704-152date:2017-04-03T00:00:00