First published: Fri Nov 11 2022(Updated: )
Insecure default variable initialization in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow an authenticated user to potentially enable denial of service via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Nuc Board Nuc5i3mybe Firmware | <myi30060 | |
Intel Nuc Board Nuc5i3mybe | ||
Intel Nuc Kit Nuc5i3myhe Firmware | <myi30060 | |
Intel Nuc Kit Nuc5i3myhe | ||
All of | ||
Intel Nuc Board Nuc5i3mybe Firmware | <myi30060 | |
Intel Nuc Board Nuc5i3mybe | ||
All of | ||
Intel Nuc Kit Nuc5i3myhe Firmware | <myi30060 | |
Intel Nuc Kit Nuc5i3myhe |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36349 is a vulnerability in the BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits that allows an authenticated user to potentially enable denial of service via local access.
CVE-2022-36349 affects some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 by exposing them to the potential risk of denial of service attacks.
CVE-2022-36349 has a severity rating of 5.5, which is considered medium.
To mitigate CVE-2022-36349, it is recommended to update the BIOS firmware of the affected Intel(R) NUC Boards and Intel(R) NUC Kits to version MYi30060 or later.
More information about CVE-2022-36349 can be found at the following link: [Intel Security Center Advisory for CVE-2022-36349](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html)