Vulnerability Details : CVE-2023-32285
Improper access control in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable denial of service via local access.
Vulnerability category: Denial of service
Products affected by CVE-2023-32285
- cpe:2.3:o:intel:nuc_kit_nuc7i7bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i5bnk_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i3bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i5bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i3bnk_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i7bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i5bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i3bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i3bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i7bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i5bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i3bnhxf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i3bnk_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i3bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i3bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i5bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i5bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i5bnk_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i5bnhxf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i5bnkp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i5bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i7bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i7bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i7bnhxg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i3bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i7bnkq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_mini_pc_nuc7i7bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i3bnhxf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i3bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i5bnhxf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i5bnkp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i5bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i7bnhxg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i7bnkq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_kit_nuc7i7bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i3bnhxf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i3bnk_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i3bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i3bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i5bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i5bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i5bnk_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i5bnhxf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i5bnkp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i5bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i7bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i7bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i7bnhxg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i3bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i7bnkq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_enthusiast_nuc7i7bnb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i3bnhxf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i3bnk_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i3bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i5bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i5bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i5bnk_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i5bnhxf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i5bnkp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i7bnh_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i7bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i7bnhxg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i3bnhx1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:nuc_board_nuc7i7bnkq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:compute_element_stk2mv64cc_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-32285
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-32285
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
0.8
|
3.6
|
NIST | |
6.0
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
1.5
|
4.0
|
Intel Corporation |
References for CVE-2023-32285
-
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
Access DeniedPatch;Vendor Advisory
Jump to