First published: Fri Jan 19 2024(Updated: )
Improper input validation for some Intel NUC BIOS firmware before version QN0073 may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Intel NUC 9 Pro Compute Element | =qncflx70.0073 | |
Intel NUC Pro Compute Element NUC9V7QNB Firmware | ||
All of | ||
Intel NUC Pro Compute Element | =qncflx70.0073 | |
Intel NUC Pro Compute Element NUC9V7QNX | ||
All of | ||
Intel NUC Pro Compute Element NUC9V7QNB Firmware | =qncflx70.0073 | |
Intel NUC 9 Pro Kit | ||
All of | ||
Intel NUC Pro Compute Element NUC9V7QNX Firmware | =qncflx70.0073 | |
Intel NUC9V7QNX Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28743 has a severity rating that indicates a potential escalation of privilege risk for users with local access.
To fix CVE-2023-28743, update your Intel NUC BIOS firmware to version QN0073 or later.
CVE-2023-28743 affects users of Intel NUC 9 Pro Compute Element and Intel NUC 9 Pro Kit devices running BIOS firmware versions prior to QN0073.
CVE-2023-28743 is an improper input validation vulnerability that can lead to privilege escalation.
CVE-2023-28743 requires local access for exploitation, making it less of a risk for remote attacks.