Vulnerability Details : CVE-2023-30768
Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.
Products affected by CVE-2023-30768
- cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600tp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1200v3rpl_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1200v3rpm_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1200v3rpo_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1200v3rps_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1400fp2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1400fp4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1400sp4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1400sp2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1600jp2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1600jp4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2400bb4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2400ep2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2400ep4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2400sc2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600co4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600coe_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600coeioc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cp2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cp2ioc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cp2j_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cp4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cp4ioc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600gl_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600gz_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600ip4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600ip4l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:workstation_board_w2600cr2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:workstation_board_w2600cr2l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600jf_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600wp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s4600lh2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s4600lt2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600wpf_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600wpq_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600jff_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600jfq_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cw2r_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cw2sr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cwtr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cwtsr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cw2s_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cwt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cwts_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600cw2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600kpfr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600kpr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600kptr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600kpf_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600tpnr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600tpfr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600tpr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600tpf_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600wtts1r_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600wt2r_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600wttr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600wt2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s2600wtt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1200btlrm_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1200btlr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1200btsr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1200btl_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:server_board_s1200bts_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-30768
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 14 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-30768
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.7
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
NIST | |
7.7
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |
1.1
|
6.0
|
Intel Corporation |
References for CVE-2023-30768
-
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html
INTEL-SA-00056Mitigation;Vendor Advisory
Jump to