ID

VAR-202308-2304


CVE

CVE-2023-34438


TITLE

Race Condition Vulnerability in Multiple Intel Products

Trust: 0.8

sources: JVNDB: JVNDB-2023-021671

DESCRIPTION

Race condition in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. nuc rugged kit nuc8cchb firmware, nuc rugged kit nuc8cchbn firmware, nuc rugged kit nuc8cchkrn A race condition vulnerability exists in multiple Intel products such as firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2023-34438 // JVNDB: JVNDB-2023-021671 // VULMON: CVE-2023-34438

AFFECTED PRODUCTS

vendor:intelmodel:nuc board nuc7i5bnhxfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc6caysscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i3bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhxfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc rugged kit nuc8cchbnscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnhxgscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i7bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhxfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc rugged kit nuc8cchkrscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i7bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i3bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i7bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i5bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i3bnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i7bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i3bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i7bnkqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i7bnkqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i3bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i5bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i5bnhxfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i3bnhxfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc rugged kit nuc8cchkrnscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i5bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i3bnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc rugged kit nuc8cchbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i7bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i5bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i5bnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i5bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i5bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i7bnkqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i5bnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i7bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i5bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i3bnhxfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i3bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i5bnkpscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i7bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i7bnhxgscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i5bnkpscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i7bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i3bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnkpscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i7bnhxgscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i7bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i3bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i5bnhxfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:compute element stk2mv64ccscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i3bnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i5bnhx1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i3bnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i5bnkpscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc6cayhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc mini pc nuc7i3bnhxfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i5bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i5bnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnkqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc7i3bnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc board nuc7i7bnhxgscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhscope:eqversion: -

Trust: 1.0

vendor:インテルmodel:nuc mini pc nuc7i5bnhscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc rugged kit nuc8cchkrscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i3bnhscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc kit nuc6caysscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i5bnhx1scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i3bnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i5bnkpscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i3bnkscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i7bnhx1scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i7bnhxgscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc rugged kit nuc8cchbnscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc rugged kit nuc8cchkrnscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i3bnhx1scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i5bnhxfscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i3bnhxfscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i5bnkscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i7bnhscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc rugged kit nuc8cchbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc mini pc nuc7i5bnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc kit nuc6cayhscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-021671 // NVD: CVE-2023-34438

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-34438
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2023-34438
value: HIGH

Trust: 1.0

NVD: CVE-2023-34438
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2023-34438
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.1
impactScore: 6.0
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2023-34438
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2023-34438
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-021671 // NVD: CVE-2023-34438 // NVD: CVE-2023-34438

PROBLEMTYPE DATA

problemtype:CWE-421

Trust: 1.0

problemtype:CWE-362

Trust: 1.0

problemtype:Race condition (CWE-362) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-021671 // NVD: CVE-2023-34438

EXTERNAL IDS

db:NVDid:CVE-2023-34438

Trust: 2.7

db:JVNid:JVNVU99796803

Trust: 0.8

db:JVNDBid:JVNDB-2023-021671

Trust: 0.8

db:VULMONid:CVE-2023-34438

Trust: 0.1

sources: VULMON: CVE-2023-34438 // JVNDB: JVNDB-2023-021671 // NVD: CVE-2023-34438

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html

Trust: 1.9

url:https://jvn.jp/vu/jvnvu99796803/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-34438

Trust: 0.8

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-34438 // JVNDB: JVNDB-2023-021671 // NVD: CVE-2023-34438

SOURCES

db:VULMONid:CVE-2023-34438
db:JVNDBid:JVNDB-2023-021671
db:NVDid:CVE-2023-34438

LAST UPDATE DATE

2024-08-14T12:12:22.287000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-34438date:2023-08-11T00:00:00
db:JVNDBid:JVNDB-2023-021671date:2024-01-19T07:55:00
db:NVDid:CVE-2023-34438date:2023-11-07T04:15:36.593

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-34438date:2023-08-11T00:00:00
db:JVNDBid:JVNDB-2023-021671date:2024-01-19T00:00:00
db:NVDid:CVE-2023-34438date:2023-08-11T03:15:34.693