Lucene search

K
cve[email protected]CVE-2022-34147
HistoryMay 10, 2023 - 2:15 p.m.

CVE-2022-34147

2023-05-1014:15:12
CWE-20
web.nvd.nist.gov
28
intel
nuc
bios
firmware
input validation
vulnerability
cve-2022-34147
security
escalation of privilege

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Improper input validation in BIOS firmware for some Intelยฎ NUC 9 Extreme Laptop Kits, Intelยฎ NUC Performance Kits, Intelยฎ NUC Performance Mini PC, Intelยฎ NUC 8 Compute Element, Intelยฎ NUC Pro Kit, Intelยฎ NUC Pro Board, and Intelยฎ NUC Compute Element may allow a privileged user to potentially enable escalation of privilege via local access.

Affected configurations

NVD
Node
intellapqc71aMatch-
AND
intellapqc71a_firmwareRange<qccfl357.0158
Node
intellapqc71bMatch-
AND
intellapqc71b_firmwareRange<qccfl357.0158
Node
intellapqc71cMatch-
AND
intellapqc71c_firmwareRange<qccfl357.0158
Node
intellapqc71dMatch-
AND
intellapqc71d_firmwareRange<qccfl357.0158
Node
intelnuc10i3fnhMatch-
AND
intelnuc10i3fnh_firmwareRange<fncml357.0059
Node
intelnuc10i3fnhfMatch-
AND
intelnuc10i3fnhf_firmwareRange<fncml357.0059
Node
intelnuc10i3fnhfaMatch-
AND
intelnuc10i3fnhfa_firmwareRange<fncml357.0059
Node
intelnuc10i3fnhjaMatch-
AND
intelnuc10i3fnhja_firmwareRange<fncml357.0059
Node
intelnuc10i3fnhnMatch-
AND
intelnuc10i3fnhn_firmwareRange<fncml357.0059
Node
intelnuc10i3fnkMatch-
AND
intelnuc10i3fnk_firmwareRange<fncml357.0059
Node
intelnuc10i3fnknMatch-
AND
intelnuc10i3fnkn_firmwareRange<fncml357.0059
Node
intelnuc10i5fnhMatch-
AND
intelnuc10i5fnh_firmwareRange<fncml357.0059
Node
intelnuc10i5fnhca_firmwareRange<fncml357.0059
AND
intelnuc10i5fnhcaMatch-
Node
intelnuc10i5fnhf_firmwareRange<fncml357.0059
AND
intelnuc10i5fnhfMatch-
Node
intelnuc10i5fnhja_firmwareRange<fncml357.0059
AND
intelnuc10i5fnhjaMatch-
Node
intelnuc10i5fnhj_firmwareRange<fncml357.0059
AND
intelnuc10i5fnhjMatch-
Node
intelnuc10i5fnhn_firmwareRange<fncml357.0059
AND
intelnuc10i5fnhnMatch-
Node
intelnuc10i5fnk_firmwareRange<fncml357.0059
AND
intelnuc10i5fnkMatch-
Node
intelnuc10i5fnkn_firmwareRange<fncml357.0059
AND
intelnuc10i5fnknMatch-
Node
intelnuc10i5fnkpa_firmwareRange<fncml357.0059
AND
intelnuc10i5fnkpaMatch-
Node
intelnuc10i5fnkp_firmwareRange<fncml357.0059
AND
intelnuc10i5fnkpMatch-
Node
intelnuc10i7fnh_firmwareRange<fncml357.0059
AND
intelnuc10i7fnhMatch-
Node
intelnuc10i7fnhaa_firmwareRange<fncml357.0059
AND
intelnuc10i7fnhaaMatch-
Node
intelnuc10i7fnhc_firmwareRange<fncml357.0059
AND
intelnuc10i7fnhcMatch-
Node
intelnuc10i7fnhja_firmwareRange<fncml357.0059
AND
intelnuc10i7fnhjaMatch-
Node
intelnuc10i7fnhn_firmwareRange<fncml357.0059
AND
intelnuc10i7fnhnMatch-
Node
intelnuc10i7fnk_firmwareRange<fncml357.0059
AND
intelnuc10i7fnkMatch-
Node
intelnuc10i7fnkn_firmwareRange<fncml357.0059
AND
intelnuc10i7fnknMatch-
Node
intelnuc10i7fnkp_firmwareRange<fncml357.0059
AND
intelnuc10i7fnkpMatch-
Node
intelnuc10i7fnkpa_firmwareRange<fncml357.0059
AND
intelnuc10i7fnkpaMatch-
Node
intelcm8i3cb4n_firmwareRange<cbwhl357.0101
AND
intelcm8i3cb4nMatch-
Node
intelcm8i5cb8n_firmwareRange<cbwhl357.0101
AND
intelcm8i5cb8nMatch-
Node
intelcm8i7cb8n_firmwareRange<cbwhl357.0101
AND
intelcm8i7cb8nMatch-
Node
intelcm8ccb4r_firmwareRange<cbwhl357.0101
AND
intelcm8ccb4rMatch-
Node
intelcm8pcb4r_firmwareRange<cbwhl357.0101
AND
intelcm8pcb4rMatch-
Node
intelnuc8i3pnb_firmwareRange<pnwhl357.0050
AND
intelnuc8i3pnbMatch-
Node
intelnuc8i3pnh_firmwareRange<pnwhl357.0050
AND
intelnuc8i3pnhMatch-
Node
intelnuc8i3pnk_firmwareRange<pnwhl357.0050
AND
intelnuc8i3pnkMatch-
Node
intelnuc9i5qn_firmwareRange<qxcfl579.0071
AND
intelnuc9i5qnMatch-
Node
intelnuc9i7qn_firmwareRange<qxcfl579.0071
AND
intelnuc9i7qnMatch-
Node
intelnuc9i9qn_firmwareRange<qxcfl579.0071
AND
intelnuc9i9qnMatch-

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Intel(R) NUC 9 Extreme Laptop Kits, Intel(R) NUC Performance Kits, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, and Intel(R) NUC Compute Element",
    "versions": [
      {
        "version": "See references",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2022-34147