ID

VAR-202308-2355


CVE

CVE-2023-32617


TITLE

Vulnerabilities in multiple Intel products

Trust: 0.8

sources: JVNDB: JVNDB-2023-021963

DESCRIPTION

Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. nuc kit nuc7i7bnhx1 firmware, nuc 7 home nuc7i5bnkp firmware, nuc 7 home nuc7i3bnhxf Multiple Intel products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2023-32617 // JVNDB: JVNDB-2023-021963 // VULMON: CVE-2023-32617

AFFECTED PRODUCTS

vendor:intelmodel:nuc kit nuc6caysscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc8cchbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i3bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i7bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i5bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 8 rugged kit nuc8cchkrscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 8 rugged board nuc8cchbnscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 7 home nuc7i5bnkpscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 7 home nuc7i5bnhxfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:compute stick stk2mv64ccscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 7 enthusiast nuc7i7bnhxgscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 7 home nuc7i3bnhxfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 8 rugged kit nuc8cchkrnscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc6cayhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 7 enthusiast nuc7i7bnkqscope:eqversion: -

Trust: 1.0

vendor:インテルmodel:nuc kit nuc7i5bnhx1scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc kit nuc7i5bnhscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc board nuc7i5bnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 7 enthusiast nuc7i7bnkqscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 7 home nuc7i5bnkpscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc kit nuc7i7bnhx1scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 rugged kit nuc8cchkrscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 rugged board nuc8cchbnscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 7 home nuc7i5bnhxfscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc kit nuc7i3bnkscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 7 home nuc7i3bnhxfscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc board nuc8cchbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc board nuc7i3bnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc board nuc7i7bnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc kit nuc7i7bnhscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc kit nuc7i3bnhx1scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc kit nuc7i5bnkscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 rugged kit nuc8cchkrnscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc kit nuc7i3bnhscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 7 enthusiast nuc7i7bnhxgscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-021963 // NVD: CVE-2023-32617

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-32617
value: MEDIUM

Trust: 1.0

secure@intel.com: CVE-2023-32617
value: HIGH

Trust: 1.0

NVD: CVE-2023-32617
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2023-32617
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2023-32617
baseSeverity: HIGH
baseScore: 8.2
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.5
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2023-32617
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-021963 // NVD: CVE-2023-32617 // NVD: CVE-2023-32617

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-20

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-021963 // NVD: CVE-2023-32617

EXTERNAL IDS

db:NVDid:CVE-2023-32617

Trust: 2.7

db:JVNid:JVNVU99796803

Trust: 0.8

db:JVNDBid:JVNDB-2023-021963

Trust: 0.8

db:VULMONid:CVE-2023-32617

Trust: 0.1

sources: VULMON: CVE-2023-32617 // JVNDB: JVNDB-2023-021963 // NVD: CVE-2023-32617

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html

Trust: 1.9

url:https://jvn.jp/vu/jvnvu99796803/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-32617

Trust: 0.8

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-32617 // JVNDB: JVNDB-2023-021963 // NVD: CVE-2023-32617

SOURCES

db:VULMONid:CVE-2023-32617
db:JVNDBid:JVNDB-2023-021963
db:NVDid:CVE-2023-32617

LAST UPDATE DATE

2024-08-14T12:57:55.535000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-32617date:2023-08-11T00:00:00
db:JVNDBid:JVNDB-2023-021963date:2024-01-22T01:58:00
db:NVDid:CVE-2023-32617date:2023-11-07T04:14:37.857

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-32617date:2023-08-11T00:00:00
db:JVNDBid:JVNDB-2023-021963date:2024-01-22T00:00:00
db:NVDid:CVE-2023-32617date:2023-08-11T03:15:32.687