CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
12.6%
Insufficient session validation in system firmware for Intelยฎ NUC may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
Vendor | Product | Version | CPE |
---|---|---|---|
intel | nuc_kit_firmware | - | cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:* |
intel | nuc_kit_nuc7i3dnx | - | cpe:2.3:h:intel:nuc_kit_nuc7i3dnx:-:*:*:*:*:*:*:* |
intel | nuc_kit_nuc7i5dnx | - | cpe:2.3:h:intel:nuc_kit_nuc7i5dnx:-:*:*:*:*:*:*:* |
intel | nuc_kit_nuc7i7dnx | - | cpe:2.3:h:intel:nuc_kit_nuc7i7dnx:-:*:*:*:*:*:*:* |
intel | compute_stick_firmware | - | cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:* |
intel | compute_stick_stk2mv64cc | - | cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:* |
intel | compute_card_firmware | - | cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:* |
intel | compute_card_cd1iv128mk | - | cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:* |
[
{
"product": "Intel(R) NUC Advisory",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See provided reference"
}
]
}
]
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
12.6%