First published: Wed Oct 11 2017(Updated: )
Insufficient protection of password storage in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows local attackers to bypass Administrator and User passwords via access to password storage.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel NUC mini PC NUC7i7BNH Firmware | =ayaplcel.86a.0041 | |
Intel NUC mini PC NUC7i7BNH Firmware | =bnkbl357.86a.0052 | |
Intel NUC mini PC NUC7i7BNH Firmware | =ccsklm5v.86a.0052 | |
Intel NUC mini PC NUC7i7BNH Firmware | =ccsklm30.86a.0052 | |
Intel NUC mini PC NUC7i7BNH Firmware | =dnkbli5v.86a.0026 | |
Intel NUC mini PC NUC7i7BNH Firmware | =dnkbli30.86a.0026 | |
Intel NUC mini PC NUC7i7BNH Firmware | =kyskli70.86a.0050 | |
Intel NUC mini PC NUC7i7BNH Firmware | =rybdwi35.86a.0366 | |
Intel NUC mini PC NUC7i7BNH Firmware | =syskli35.86a.0062 | |
Intel NUC mini PC NUC7i7BNH Firmware | =tybyt20h.86a.0015 | |
Intel NUC 7i7BNH | ||
Intel NUC Board NUC7i5BNH Firmware | =ayaplcel.86a.0041 | |
Intel NUC Board NUC7i5BNH Firmware | =bnkbl357.86a.0052 | |
Intel NUC Board NUC7i5BNH Firmware | =ccsklm5v.86a.0052 | |
Intel NUC Board NUC7i5BNH Firmware | =ccsklm30.86a.0052 | |
Intel NUC Board NUC7i5BNH Firmware | =dnkbli5v.86a.0026 | |
Intel NUC Board NUC7i5BNH Firmware | =dnkbli30.86a.0026 | |
Intel NUC Board NUC7i5BNH Firmware | =kyskli70.86a.0050 | |
Intel NUC Board NUC7i5BNH Firmware | =rybdwi35.86a.0366 | |
Intel NUC Board NUC7i5BNH Firmware | =syskli35.86a.0062 | |
Intel NUC Board NUC7i5BNH Firmware | =tybyt20h.86a.0015 | |
Intel NUC 7i5BNH | ||
Intel NUC 7i5BNK Firmware | =ayaplcel.86a.0041 | |
Intel NUC 7i5BNK Firmware | =bnkbl357.86a.0052 | |
Intel NUC 7i5BNK Firmware | =ccsklm5v.86a.0052 | |
Intel NUC 7i5BNK Firmware | =ccsklm30.86a.0052 | |
Intel NUC 7i5BNK Firmware | =dnkbli5v.86a.0026 | |
Intel NUC 7i5BNK Firmware | =dnkbli30.86a.0026 | |
Intel NUC 7i5BNK Firmware | =kyskli70.86a.0050 | |
Intel NUC 7i5BNK Firmware | =rybdwi35.86a.0366 | |
Intel NUC 7i5BNK Firmware | =syskli35.86a.0062 | |
Intel NUC 7i5BNK Firmware | =tybyt20h.86a.0015 | |
Intel NUC 7i5-BNK | ||
Intel NUC board NUC7i3BNH firmware | =ayaplcel.86a.0041 | |
Intel NUC board NUC7i3BNH firmware | =bnkbl357.86a.0052 | |
Intel NUC board NUC7i3BNH firmware | =ccsklm5v.86a.0052 | |
Intel NUC board NUC7i3BNH firmware | =ccsklm30.86a.0052 | |
Intel NUC board NUC7i3BNH firmware | =dnkbli5v.86a.0026 | |
Intel NUC board NUC7i3BNH firmware | =dnkbli30.86a.0026 | |
Intel NUC board NUC7i3BNH firmware | =kyskli70.86a.0050 | |
Intel NUC board NUC7i3BNH firmware | =rybdwi35.86a.0366 | |
Intel NUC board NUC7i3BNH firmware | =syskli35.86a.0062 | |
Intel NUC board NUC7i3BNH firmware | =tybyt20h.86a.0015 | |
Intel NUC7i3BNH Firmware | ||
Intel NUC board NUC7i3BNK firmware | =ayaplcel.86a.0041 | |
Intel NUC board NUC7i3BNK firmware | =bnkbl357.86a.0052 | |
Intel NUC board NUC7i3BNK firmware | =ccsklm5v.86a.0052 | |
Intel NUC board NUC7i3BNK firmware | =ccsklm30.86a.0052 | |
Intel NUC board NUC7i3BNK firmware | =dnkbli5v.86a.0026 | |
Intel NUC board NUC7i3BNK firmware | =dnkbli30.86a.0026 | |
Intel NUC board NUC7i3BNK firmware | =kyskli70.86a.0050 | |
Intel NUC board NUC7i3BNK firmware | =rybdwi35.86a.0366 | |
Intel NUC board NUC7i3BNK firmware | =syskli35.86a.0062 | |
Intel NUC board NUC7i3BNK firmware | =tybyt20h.86a.0015 | |
Intel NUC kit nuc7i3bnk |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5700 has a moderate severity rating, allowing local attackers to bypass Administrator and User passwords.
To fix CVE-2017-5700, update the affected Intel NUC firmware to the latest version that addresses the vulnerability.
The affected models include Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, and NUC7i7BNH with specific firmware versions.
Exploitation of CVE-2017-5700 allows attackers to access password storage and bypass authentication measures.
Currently, the recommended solution for CVE-2017-5700 is to update the firmware, as there are no viable workarounds.