First published: Wed Oct 11 2017(Updated: )
Insufficient input validation in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows local attackers to execute arbitrary code via manipulation of memory.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel NUC mini PC NUC7i7BNH Firmware | =ayaplcel.86a.0041 | |
Intel NUC mini PC NUC7i7BNH Firmware | =bnkbl357.86a.0052 | |
Intel NUC mini PC NUC7i7BNH Firmware | =ccsklm5v.86a.0052 | |
Intel NUC mini PC NUC7i7BNH Firmware | =ccsklm30.86a.0052 | |
Intel NUC mini PC NUC7i7BNH Firmware | =dnkbli5v.86a.0026 | |
Intel NUC mini PC NUC7i7BNH Firmware | =dnkbli30.86a.0026 | |
Intel NUC mini PC NUC7i7BNH Firmware | =kyskli70.86a.0050 | |
Intel NUC mini PC NUC7i7BNH Firmware | =rybdwi35.86a.0366 | |
Intel NUC mini PC NUC7i7BNH Firmware | =syskli35.86a.0062 | |
Intel NUC mini PC NUC7i7BNH Firmware | =tybyt20h.86a.0015 | |
Intel NUC NUC7i7BNH | ||
Intel NUC Board NUC7i5BNH Firmware | =ayaplcel.86a.0041 | |
Intel NUC Board NUC7i5BNH Firmware | =bnkbl357.86a.0052 | |
Intel NUC Board NUC7i5BNH Firmware | =ccsklm5v.86a.0052 | |
Intel NUC Board NUC7i5BNH Firmware | =ccsklm30.86a.0052 | |
Intel NUC Board NUC7i5BNH Firmware | =dnkbli5v.86a.0026 | |
Intel NUC Board NUC7i5BNH Firmware | =dnkbli30.86a.0026 | |
Intel NUC Board NUC7i5BNH Firmware | =kyskli70.86a.0050 | |
Intel NUC Board NUC7i5BNH Firmware | =rybdwi35.86a.0366 | |
Intel NUC Board NUC7i5BNH Firmware | =syskli35.86a.0062 | |
Intel NUC Board NUC7i5BNH Firmware | =tybyt20h.86a.0015 | |
Intel NUC 7i5BNH | ||
Intel NUC 7i5BNK Firmware | =ayaplcel.86a.0041 | |
Intel NUC 7i5BNK Firmware | =bnkbl357.86a.0052 | |
Intel NUC 7i5BNK Firmware | =ccsklm5v.86a.0052 | |
Intel NUC 7i5BNK Firmware | =ccsklm30.86a.0052 | |
Intel NUC 7i5BNK Firmware | =dnkbli5v.86a.0026 | |
Intel NUC 7i5BNK Firmware | =dnkbli30.86a.0026 | |
Intel NUC 7i5BNK Firmware | =kyskli70.86a.0050 | |
Intel NUC 7i5BNK Firmware | =rybdwi35.86a.0366 | |
Intel NUC 7i5BNK Firmware | =syskli35.86a.0062 | |
Intel NUC 7i5BNK Firmware | =tybyt20h.86a.0015 | |
Intel NUC 7i5-BNK | ||
Intel NUC mini PC NUC7i3BNH firmware | =ayaplcel.86a.0041 | |
Intel NUC mini PC NUC7i3BNH firmware | =bnkbl357.86a.0052 | |
Intel NUC mini PC NUC7i3BNH firmware | =ccsklm5v.86a.0052 | |
Intel NUC mini PC NUC7i3BNH firmware | =ccsklm30.86a.0052 | |
Intel NUC mini PC NUC7i3BNH firmware | =dnkbli5v.86a.0026 | |
Intel NUC mini PC NUC7i3BNH firmware | =dnkbli30.86a.0026 | |
Intel NUC mini PC NUC7i3BNH firmware | =kyskli70.86a.0050 | |
Intel NUC mini PC NUC7i3BNH firmware | =rybdwi35.86a.0366 | |
Intel NUC mini PC NUC7i3BNH firmware | =syskli35.86a.0062 | |
Intel NUC mini PC NUC7i3BNH firmware | =tybyt20h.86a.0015 | |
Intel NUC7i3BNH Firmware | ||
Intel NUC board NUC7i3BNK firmware | =ayaplcel.86a.0041 | |
Intel NUC board NUC7i3BNK firmware | =bnkbl357.86a.0052 | |
Intel NUC board NUC7i3BNK firmware | =ccsklm5v.86a.0052 | |
Intel NUC board NUC7i3BNK firmware | =ccsklm30.86a.0052 | |
Intel NUC board NUC7i3BNK firmware | =dnkbli5v.86a.0026 | |
Intel NUC board NUC7i3BNK firmware | =dnkbli30.86a.0026 | |
Intel NUC board NUC7i3BNK firmware | =kyskli70.86a.0050 | |
Intel NUC board NUC7i3BNK firmware | =rybdwi35.86a.0366 | |
Intel NUC board NUC7i3BNK firmware | =syskli35.86a.0062 | |
Intel NUC board NUC7i3BNK firmware | =tybyt20h.86a.0015 | |
Intel NUC kit nuc7i3bnk |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5721 is considered a high severity vulnerability due to its potential to allow local attackers to execute arbitrary code.
To fix CVE-2017-5721, you should update the affected Intel NUC firmware to the latest version provided by Intel.
CVE-2017-5721 affects various models of Intel NUC, including NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, and NUC7i7BNH.
No, CVE-2017-5721 is a local vulnerability, meaning attackers need physical access to the affected device to exploit it.
Insufficient input validation in CVE-2017-5721 refers to the failure of the firmware to properly check or restrict user input, potentially leading to unauthorized code execution.