7.5
CWE
119 92
Advisory Published
Updated

CVE-2022-36372: Buffer Overflow

First published: Fri Aug 11 2023(Updated: )

Improper buffer restrictions in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Credit: secure@intel.com secure@intel.com

Affected SoftwareAffected VersionHow to fix
Intel NUC 8 Compute Element CM8I3CB4N
Intel NUC 8 Compute Element CM8I3CB4N Firmware
Intel NUC 8 Compute Element CM8i5CB8N
Intel NUC 8 Compute Element CM8I5CB8N Firmware
Intel cm8i7cb8n firmware
Intel NUC 8 Compute Element CM8i7CB8N
Intel NUC 8 Compute Element CM8CCB Firmware
Intel NUC 8 Compute Element CM8CCB4R Firmware
Intel NUC 8 Compute Element CM8PCB4R
Intel NUC 8 Compute Element CM8PCB4R Firmware
Intel NUC Pro Board NUC8i3PNB Firmware
Intel NUC Pro Kit NUC8i3PNB Firmware
Intel NUC Pro Board NUC8i3PNH
Intel NUC Pro Kit NUC8i3PNH Firmware
Intel NUC 8 Pro Kit NUC8i3PNK Firmware
Intel NUC Pro Kit NUC8i3PNK Firmware
Intel NUC 8i3 PNB
Intel NUC Pro Board NUC8i3PNB Firmware
Intel NUC Pro Board NUC8i3PNH
Intel NUC Pro Board NUC8i3PNH Firmware
Intel NUC 8 i3 PNK Firmware
Intel NUC Pro Board NUC8i3PNK Firmware
Intel NUC 8 CCHB Firmware
Intel NUC Rugged Kit NUC8CCHB Firmware
Intel NUC 8 CCHBN Firmware
Intel NUC 8 CCHBN Firmware
Intel NUC Rugged Kit NUC8CCHKR
Intel NUC Rugged Kit NUC8CCHKrN Firmware
Intel NUC Rugged Kit NUC8CCHKrN Firmware
Intel NUC Rugged Kit NUC8CCHKrN Firmware
Intel NUC 9 Pro Compute Element NUC9V7QNB Firmware
Intel NUC Pro Compute Element NUC9V7QNB Firmware
Intel NUC9V7QNX Firmware
Intel NUC Pro Compute Element NUC9V7QNX Firmware
Intel NUC Pro Compute Element NUC9VXQNB
Intel NUC Pro Compute Element NUC9V7QNB Firmware
Intel NUC 9 VXQNX
Intel NUC 9 Pro Compute Element NUC9VXQNX
Intel NUC 8 Business NUC8i7HNKQC Firmware
Intel NUC 8 Business NUC8i7HNKQC Firmware
Intel NUC 8i7 HVKVAW Firmware
Intel NUC 8 Business NUC8i7HVKVA
Intel NUC 8i7 HVKVAW Firmware
Intel NUC Business NUC8i7HVKVAW Firmware
Intel NUC Business NUC8i7HVKVA Firmware
Intel NUC 8 Business NUC8i7HVK
Intel NUC 8 Business NUC8i7HNK Firmware
Intel NUC 8 Business NUC8i7HNK
Intel NUC enthusiast nuc8i7hnkqc firmware
Intel NUC 8 Enthusiast NUC8i7HNKQC
Intel NUC 8 Enthusiast NUC8i7HVKVA
Intel NUC 8 Enthusiast NUC8i7HVKVA
Intel NUC 8 Enthusiast NUC8i7HVKVAW Firmware
Intel NUC 8 Enthusiast NUC8i7HVK
Intel NUC 8 Enthusiast NUC8i7HVK Firmware
Intel NUC 8 Enthusiast NUC8i7HVK Firmware
Intel NUC 8 Enthusiast NUC8i7HNK Firmware
Intel NUC 8 Enthusiast NUC8i7HNK Firmware
Intel NUC 8i7 HN-KQC Firmware
Intel NUC kit nuc8i7hnkqc firmware
Intel NUC Business NUC8i7HVKVA Firmware
Intel NUC 8 i7 HVKVA
Intel NUC 8i7 HVKVAW Firmware
Intel NUC kit nuc8i7hvkvaw
Intel NUC 8i7HVK Firmware
Intel NUC Kit NUC8i7HVK
Intel NUC8i7HNK Firmware
Intel NUC kit NUC8i7HNK

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-36372?

    CVE-2022-36372 has a severity rating that indicates a potential escalation of privilege for privileged users.

  • How do I fix CVE-2022-36372?

    Fixing CVE-2022-36372 involves updating the Intel NUC BIOS firmware to the latest version that addresses this vulnerability.

  • What systems are affected by CVE-2022-36372?

    CVE-2022-36372 affects various models of Intel NUC 8 Compute Element and some related firmware versions.

  • Is local access required to exploit CVE-2022-36372?

    Yes, local access is required for a privileged user to exploit CVE-2022-36372 and potentially escalate their privileges.

  • Who is responsible for mitigating CVE-2022-36372?

    Users and administrators of affected Intel NUC systems are responsible for applying the necessary firmware updates to mitigate CVE-2022-36372.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203