First published: Fri Jan 19 2024(Updated: )
Improper input validation for some Intel NUC BIOS firmware before version JY0070 may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Intel NUC 7 Essential | ||
Intel NUC 7 Essential NUC7CJYSAMN Firmware | =jyglkcpx.0071 | |
All of | ||
Intel NUC7CJYHN Firmware | ||
Intel NUC kit NUC7CJYHN | =jyglkcpx.0071 | |
All of | ||
Intel NUC Kit NUC7PJYHN | ||
Intel NUC kit NUC7PJYH | =jyglkcpx.0071 | |
All of | ||
Intel NUC 7 PJYH | ||
Intel NUC kit NUC7PJYH | =jyglkcpx.0071 | |
All of | ||
Intel NUC Kit NUC7CJYSal Firmware | ||
Intel NUC 7 Essential PC NUC7CJYSAL | =jyglkcpx.0071 | |
All of | ||
Intel NUC kit NUC7CJYH | ||
Intel NUC kit nuc7cjyh | =jyglkcpx.0071 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28738 has been classified with a CVSS score indicating a risk of privilege escalation for users with local access to the affected systems.
To mitigate CVE-2023-28738, update the Intel NUC BIOS firmware to version JY0070 or later.
CVE-2023-28738 affects several Intel NUC devices with BIOS firmware versions prior to JY0070.
No, CVE-2023-28738 requires local access to exploit the privilege escalation vulnerability.
Exploitation of CVE-2023-28738 could lead to unauthorized access or control over the affected Intel NUC systems.