First published: Fri Nov 11 2022(Updated: )
Improper authentication in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Intel NUC5i3MYHE Firmware | <myi30060 | |
Intel NUC kit nuc5i3myhe firmware | ||
All of | ||
Intel NUC 5i3MYBE firmware | <myi30060 | |
Intel NUC NUC5i3MYBE | ||
Intel NUC5i3MYHE Firmware | <myi30060 | |
Intel NUC kit nuc5i3myhe firmware | ||
Intel NUC 5i3MYBE firmware | <myi30060 | |
Intel NUC NUC5i3MYBE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security advisory is CVE-2022-36370.
The severity of CVE-2022-36370 is 7.8 (High).
The Intel NUC Boards and Kits affected by CVE-2022-36370 are NUC5i3MYHE and NUC5i3MYBE.
The potential impact of CVE-2022-36370 is that a privileged user may be able to enable escalation of privilege via local access.
To fix the CVE-2022-36370 vulnerability, you should update the BIOS firmware for the affected Intel NUC Boards and Kits to version MYi30060 or later.