Potential security vulnerabilities in some Intel® Ethernet tools and driver install software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2023-39432
Description: Improper access control element in some Intel® Ethernet tools and driver install software, before versions 28.2, may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2023-33870
Description: Insecure inherited permissions in some Intel® Ethernet tools and driver install software may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Installation software for Intel® Ethernet Connections Boot Utility, Preboot Images, and EFI Drivers before version 28.2.
Installation software for Administrative Tools for Intel® Network Adapters before version 28.2.
Installation software for Intel® Ethernet Adapter Complete Driver Pack before version 28.2.
Intel® Ethernet Connections Boot Utility, Preboot Images, and EFI Drivers
Administrative Tools for Intel® Network Adapters
Intel® Ethernet Adapter Complete Driver Pack
Intel recommends updating to the versions below:
Intel® Ethernet Connections Boot Utility, Preboot Images, and EFI Drivers to version 28.2 or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/download/15755/intel-ethernet-connections-boot-utility-preboot-images-and-efi-drivers.html?wapkw=preboot >
Administrative Tools for Intel® Network Adapters to version 28.2 or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/download/2593/administrative-tools-for-intel-network-adapters.html?wapkw=administrative tools >
Intel® Ethernet Adapter Complete Driver Pack to version 28.2.0.0 or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/download/15084/intel-ethernet-adapter-complete-driver-pack.html?wapkw=complete driver pack>
Intel would like to thank ycdxsb of VARAS@IIE (CVE-2023-33870), Falcon Corruption @falconCorrup and @j00sean (CVE-2023-39432) for reporting these issues.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.