ID

VAR-202305-0583


CVE

CVE-2023-25771


TITLE

Vulnerabilities in multiple Intel products

Trust: 0.8

sources: JVNDB: JVNDB-2023-010416

DESCRIPTION

Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable denial of service via local access. nuc 8 compute element cm8i3cb4n firmware, nuc 8 compute element cm8i5cb8n firmware, nuc 8 compute element cm8i7cb8n Multiple Intel products such as firmware have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2023-25771 // JVNDB: JVNDB-2023-010416 // VULMON: CVE-2023-25771

AFFECTED PRODUCTS

vendor:intelmodel:nuc 7 enthusiast nuc7i7bnhxgscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc 8 enthusiast nuc8i7hvkvawscope:ltversion:hnkbki70.0070

Trust: 1.0

vendor:intelmodel:nuc kit nuc7pjyhnscope:ltversion:jyglkcpx.0069

Trust: 1.0

vendor:intelmodel:nuc 8 home nuc8i3cysnscope:ltversion:cycnli35.0054

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hvkscope:ltversion:hnkbki70.0070

Trust: 1.0

vendor:intelmodel:nuc kit nuc7cjyhscope:ltversion:ayaplcel.0074

Trust: 1.0

vendor:intelmodel:nuc 7 essential nuc7cjysalscope:ltversion:ayaplcel.0074

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i5behsscope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnkscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i5cb8nscope:ltversion:cbwhl357.0101

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i3behscope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc 8 pro kit nuc8i3pnhscope:ltversion:pnwhl357.0050

Trust: 1.0

vendor:intelmodel:nuc 7 enthusiast nuc7i7bnkqscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:compute stick stk2mv64ccscope:ltversion:ccsklm5v.0067

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhx1scope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc kit nuc7cjyhnscope:ltversion:jyglkcpx.0069

Trust: 1.0

vendor:intelmodel:nuc 8 pro board nuc8i3pnbscope:ltversion:pnwhl357.0050

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i7cb8nscope:ltversion:cbwhl357.0101

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhx1scope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc board nuc7i3bnbscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g mini pc nuc8i5inhscope:ltversion:inwhl357.0047

Trust: 1.0

vendor:intelmodel:nuc 7 home nuc7i5bnhxfscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc 8 pro kit nuc8i3pnkscope:ltversion:pnwhl357.0050

Trust: 1.0

vendor:intelmodel:nuc board nuc7i7bnbscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8pcb4rscope:ltversion:cbwhl357.0101

Trust: 1.0

vendor:intelmodel:nuc 8 home nuc8i5bekpascope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc kit nuc7pjyhscope:ltversion:ayaplcel.0074

Trust: 1.0

vendor:intelmodel:nuc 9 pro compute element nuc9v7qnbscope:ltversion:qncflx70.0071

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnhx1scope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8ccb4rscope:ltversion:cbwhl357.0101

Trust: 1.0

vendor:intelmodel:nuc 7 essential nuc7cjysamnscope:ltversion:ayaplcel.0074

Trust: 1.0

vendor:intelmodel:nuc kit nuc7pjyhnscope:ltversion:ayaplcel.0074

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i7inhscope:ltversion:inwhl357.0047

Trust: 1.0

vendor:intelmodel:nuc 8 business nuc8i7hnkqcscope:ltversion:hnkbki70.0070

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hnkscope:ltversion:hnkbki70.0070

Trust: 1.0

vendor:intelmodel:nuc 7 home nuc7i3bnhxfscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc kit nuc7cjyhscope:ltversion:jyglkcpx.0069

Trust: 1.0

vendor:intelmodel:nuc 8 home nuc8i3cysmscope:ltversion:cycnli35.0054

Trust: 1.0

vendor:intelmodel:nuc 7 essential nuc7cjysalscope:ltversion:jyglkcpx.0069

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnkscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc 8 enthusiast nuc8i7hvkvascope:ltversion:hnkbki70.0070

Trust: 1.0

vendor:intelmodel:nuc kit nuc7cjyhnscope:ltversion:ayaplcel.0074

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7bekscope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc 9 pro compute element nuc9vxqnxscope:ltversion:qncflx70.0071

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i3bekscope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc 8 enthusiast nuc8i7bekqascope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc 9 pro compute element nuc9v7qnxscope:ltversion:qncflx70.0071

Trust: 1.0

vendor:intelmodel:nuc 9 pro compute element nuc9vxqnbscope:ltversion:qncflx70.0071

Trust: 1.0

vendor:intelmodel:nuc 8 home nuc8i3behfascope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc 8 home nuc8i5behfascope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc 7 home nuc7i5bnkpscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc board nuc7i5bnbscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i5inhscope:ltversion:inwhl357.0047

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7behscope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i5behscope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc kit nuc7pjyhscope:ltversion:jyglkcpx.0069

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnhscope:ltversion:bnkbl357.0089

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g mini pc nuc8i7inhscope:ltversion:inwhl357.0047

Trust: 1.0

vendor:intelmodel:nuc 8 enthusiast nuc8i7behgascope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i5bekscope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i3behsscope:ltversion:becfl357.0092

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i3cb4nscope:ltversion:cbwhl357.0101

Trust: 1.0

vendor:intelmodel:nuc 7 essential nuc7cjysamnscope:ltversion:jyglkcpx.0069

Trust: 1.0

vendor:インテルmodel:nuc 8 compute element cm8i5cb8nscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 pro kit nuc8i3pnhscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc kit nuc8i5bekscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 pro kit nuc8i3pnkscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 enthusiast nuc8i7behgascope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 pro board nuc8i3pnpscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 enthusiast nuc8i7bekqascope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 9 pro compute element nuc9v7qnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 compute element cm8pcb4rscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 9 pro compute element nuc9v7qnxscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 9 pro compute element nuc9vxqnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 home nuc8i3behfascope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc kit nuc8i5behscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 compute element cm8ccb4rscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 9 pro compute element nuc9vxqnxscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc kit nuc8i7behscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 compute element cm8i3cb4nscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 compute element cm8i7cb8nscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 home nuc8i5behfascope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 home nuc8i5bekpascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-010416 // NVD: CVE-2023-25771

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-25771
value: MEDIUM

Trust: 1.0

secure@intel.com: CVE-2023-25771
value: MEDIUM

Trust: 1.0

NVD: CVE-2023-25771
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202305-826
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2023-25771
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2023-25771
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 0.6
impactScore: 4.7
version: 3.1

Trust: 1.0

NVD: CVE-2023-25771
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-010416 // CNNVD: CNNVD-202305-826 // NVD: CVE-2023-25771 // NVD: CVE-2023-25771

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-284

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-010416 // NVD: CVE-2023-25771

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202305-826

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202305-826

PATCH

title:Intel NUC Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=238421

Trust: 0.6

sources: CNNVD: CNNVD-202305-826

EXTERNAL IDS

db:NVDid:CVE-2023-25771

Trust: 3.3

db:JVNid:JVNVU99370518

Trust: 0.8

db:JVNDBid:JVNDB-2023-010416

Trust: 0.8

db:AUSCERTid:ESB-2023.2566

Trust: 0.6

db:CNNVDid:CNNVD-202305-826

Trust: 0.6

db:VULMONid:CVE-2023-25771

Trust: 0.1

sources: VULMON: CVE-2023-25771 // JVNDB: JVNDB-2023-010416 // CNNVD: CNNVD-202305-826 // NVD: CVE-2023-25771

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html

Trust: 2.5

url:https://jvn.jp/vu/jvnvu99370518/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-25771

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2023.2566

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2023-25771/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-25771 // JVNDB: JVNDB-2023-010416 // CNNVD: CNNVD-202305-826 // NVD: CVE-2023-25771

SOURCES

db:VULMONid:CVE-2023-25771
db:JVNDBid:JVNDB-2023-010416
db:CNNVDid:CNNVD-202305-826
db:NVDid:CVE-2023-25771

LAST UPDATE DATE

2024-08-14T12:26:50.371000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-25771date:2023-05-10T00:00:00
db:JVNDBid:JVNDB-2023-010416date:2023-12-08T06:52:00
db:CNNVDid:CNNVD-202305-826date:2023-05-22T00:00:00
db:NVDid:CVE-2023-25771date:2023-11-07T04:09:10.947

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-25771date:2023-05-10T00:00:00
db:JVNDBid:JVNDB-2023-010416date:2023-12-08T00:00:00
db:CNNVDid:CNNVD-202305-826date:2023-05-10T00:00:00
db:NVDid:CVE-2023-25771date:2023-05-10T14:15:32.310