First published: Wed Oct 11 2017(Updated: )
Incorrect policy enforcement in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows attackers with local or physical access to bypass enforcement of integrity protections via manipulation of firmware storage.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel NUC mini PC NUC7i7BNH Firmware | =ayaplcel.86a.0041 | |
Intel NUC mini PC NUC7i7BNH Firmware | =bnkbl357.86a.0052 | |
Intel NUC mini PC NUC7i7BNH Firmware | =ccsklm5v.86a.0052 | |
Intel NUC mini PC NUC7i7BNH Firmware | =ccsklm30.86a.0052 | |
Intel NUC mini PC NUC7i7BNH Firmware | =dnkbli5v.86a.0026 | |
Intel NUC mini PC NUC7i7BNH Firmware | =dnkbli30.86a.0026 | |
Intel NUC mini PC NUC7i7BNH Firmware | =kyskli70.86a.0050 | |
Intel NUC mini PC NUC7i7BNH Firmware | =rybdwi35.86a.0366 | |
Intel NUC mini PC NUC7i7BNH Firmware | =syskli35.86a.0062 | |
Intel NUC mini PC NUC7i7BNH Firmware | =tybyt20h.86a.0015 | |
Intel NUC 7i7BNH | ||
Intel NUC Board NUC7i5BNH Firmware | =ayaplcel.86a.0041 | |
Intel NUC Board NUC7i5BNH Firmware | =bnkbl357.86a.0052 | |
Intel NUC Board NUC7i5BNH Firmware | =ccsklm5v.86a.0052 | |
Intel NUC Board NUC7i5BNH Firmware | =ccsklm30.86a.0052 | |
Intel NUC Board NUC7i5BNH Firmware | =dnkbli5v.86a.0026 | |
Intel NUC Board NUC7i5BNH Firmware | =dnkbli30.86a.0026 | |
Intel NUC Board NUC7i5BNH Firmware | =kyskli70.86a.0050 | |
Intel NUC Board NUC7i5BNH Firmware | =rybdwi35.86a.0366 | |
Intel NUC Board NUC7i5BNH Firmware | =syskli35.86a.0062 | |
Intel NUC Board NUC7i5BNH Firmware | =tybyt20h.86a.0015 | |
Intel NUC 7i5BNH | ||
Intel NUC 7i5BNK Firmware | =ayaplcel.86a.0041 | |
Intel NUC 7i5BNK Firmware | =bnkbl357.86a.0052 | |
Intel NUC 7i5BNK Firmware | =ccsklm5v.86a.0052 | |
Intel NUC 7i5BNK Firmware | =ccsklm30.86a.0052 | |
Intel NUC 7i5BNK Firmware | =dnkbli5v.86a.0026 | |
Intel NUC 7i5BNK Firmware | =dnkbli30.86a.0026 | |
Intel NUC 7i5BNK Firmware | =kyskli70.86a.0050 | |
Intel NUC 7i5BNK Firmware | =rybdwi35.86a.0366 | |
Intel NUC 7i5BNK Firmware | =syskli35.86a.0062 | |
Intel NUC 7i5BNK Firmware | =tybyt20h.86a.0015 | |
Intel NUC 7i5-BNK | ||
Intel NUC board NUC7i3BNH firmware | =ayaplcel.86a.0041 | |
Intel NUC board NUC7i3BNH firmware | =bnkbl357.86a.0052 | |
Intel NUC board NUC7i3BNH firmware | =ccsklm5v.86a.0052 | |
Intel NUC board NUC7i3BNH firmware | =ccsklm30.86a.0052 | |
Intel NUC board NUC7i3BNH firmware | =dnkbli5v.86a.0026 | |
Intel NUC board NUC7i3BNH firmware | =dnkbli30.86a.0026 | |
Intel NUC board NUC7i3BNH firmware | =kyskli70.86a.0050 | |
Intel NUC board NUC7i3BNH firmware | =rybdwi35.86a.0366 | |
Intel NUC board NUC7i3BNH firmware | =syskli35.86a.0062 | |
Intel NUC board NUC7i3BNH firmware | =tybyt20h.86a.0015 | |
Intel NUC7i3BNH Firmware | ||
Intel NUC board NUC7i3BNK firmware | =ayaplcel.86a.0041 | |
Intel NUC board NUC7i3BNK firmware | =bnkbl357.86a.0052 | |
Intel NUC board NUC7i3BNK firmware | =ccsklm5v.86a.0052 | |
Intel NUC board NUC7i3BNK firmware | =ccsklm30.86a.0052 | |
Intel NUC board NUC7i3BNK firmware | =dnkbli5v.86a.0026 | |
Intel NUC board NUC7i3BNK firmware | =dnkbli30.86a.0026 | |
Intel NUC board NUC7i3BNK firmware | =kyskli70.86a.0050 | |
Intel NUC board NUC7i3BNK firmware | =rybdwi35.86a.0366 | |
Intel NUC board NUC7i3BNK firmware | =syskli35.86a.0062 | |
Intel NUC board NUC7i3BNK firmware | =tybyt20h.86a.0015 | |
Intel NUC kit nuc7i3bnk |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5722 is categorized as a high severity vulnerability due to its potential to allow local or physical access attackers to bypass integrity protections.
To fix CVE-2017-5722, users should update their firmware to versions BN0050 or later for affected Intel NUC models.
CVE-2017-5722 affects Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, and NUC7i7BNH firmware versions BN0049 and below.
CVE-2017-5722 is an integrity protection bypass vulnerability due to incorrect policy enforcement in system firmware.
No, CVE-2017-5722 requires local or physical access to the affected device to be exploited.