First published: Fri Aug 11 2023(Updated: )
Improper input validation in BIOS firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Nuc 11 Pro Kit Nuc11tnhi70z Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi70z | ||
Intel Nuc 11 Pro Kit Nuc11tnki70z Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnki70z | ||
Intel Nuc 11 Pro Kit Nuc11tnki30z Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnki30z | ||
Intel Nuc 11 Pro Kit Nuc11tnhi30z Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi30z | ||
Intel Nuc 11 Pro Kit Nuc11tnki50z Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnki50z | ||
Intel Nuc 11 Pro Kit Nuc11tnhi50z Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi50z | ||
Intel Nuc 11 Pro Board Nuc11tnbi30z Firmware | ||
Intel Nuc 11 Pro Board Nuc11tnbi30z | ||
Intel Nuc 11 Pro Board Nuc11tnbi50z Firmware | ||
Intel Nuc 11 Pro Board Nuc11tnbi50z | ||
Intel Nuc 11 Pro Board Nuc11tnbi70z Firmware | ||
Intel Nuc 11 Pro Board Nuc11tnbi70z | ||
Intel Nuc 11 Pro Kit Nuc11tnhi3 Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi3 | ||
Intel Nuc 11 Pro Kit Nuc11tnhi5 Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi5 | ||
Intel Nuc 11 Pro Kit Nuc11tnhi7 Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi7 | ||
Intel Nuc 11 Pro Kit Nuc11tnki3 Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnki3 | ||
Intel Nuc 11 Pro Kit Nuc11tnki5 Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnki5 | ||
Intel Nuc 11 Pro Kit Nuc11tnki7 Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnki7 | ||
Intel Nuc 11 Pro Board Nuc11tnbi3 Firmware | ||
Intel Nuc 11 Pro Board Nuc11tnbi3 | ||
Intel Nuc 11 Pro Board Nuc11tnbi5 Firmware | ||
Intel Nuc 11 Pro Board Nuc11tnbi5 | ||
Intel Nuc 11 Pro Board Nuc11tnbi7 Firmware | ||
Intel Nuc 11 Pro Board Nuc11tnbi7 | ||
Intel Nuc 11 Pro Kit Nuc11tnhi50w Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi50w | ||
Intel Nuc 11 Pro Kit Nuc11tnhi50l Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi50l | ||
Intel Nuc 11 Pro Kit Nuc11tnhi30l Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi30l | ||
Intel Nuc 11 Pro Kit Nuc11tnhi70q Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi70q | ||
Intel Nuc 11 Pro Kit Nuc11tnhi30p Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi30p | ||
Intel Nuc 11 Pro Kit Nuc11tnhi70l Firmware | ||
Intel Nuc 11 Pro Kit Nuc11tnhi70l |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29494 is a vulnerability in the BIOS firmware for some Intel(R) NUCs that may allow a privileged user to enable escalation of privilege via local access.
CVE-2023-29494 has a severity rating of 6.7 out of 10, which is considered high.
CVE-2023-29494 affects Intel NUC 11 Pro Kit Nuc11tnhi70z Firmware, Intel NUC 11 Pro Kit Nuc11tnki70z Firmware, Intel NUC 11 Pro Kit Nuc11tnki30z Firmware, Intel NUC 11 Pro Kit Nuc11tnhi30z Firmware, Intel NUC 11 Pro Kit Nuc11tnki50z Firmware, Intel NUC 11 Pro Kit Nuc11tnhi50z Firmware, Intel NUC 11 Pro Board Nuc11tnbi30z Firmware, Intel NUC 11 Pro Board Nuc11tnbi50z Firmware, Intel NUC 11 Pro Board Nuc11tnbi70z Firmware, Intel NUC 11 Pro Kit Nuc11tnhi3 Firmware, Intel NUC 11 Pro Kit Nuc11tnhi5 Firmware, Intel NUC 11 Pro Kit Nuc11tnhi7 Firmware, Intel NUC 11 Pro Kit Nuc11tnki3 Firmware, Intel NUC 11 Pro Kit Nuc11tnki5 Firmware, Intel NUC 11 Pro Kit Nuc11tnki7 Firmware, Intel NUC 11 Pro Board Nuc11tnbi3 Firmware, Intel NUC 11 Pro Board Nuc11tnbi5 Firmware, Intel NUC 11 Pro Board Nuc11tnbi7 Firmware, Intel NUC 11 Pro Kit Nuc11tnhi50w Firmware, Intel NUC 11 Pro Kit Nuc11tnhi50l Firmware, Intel NUC 11 Pro Kit Nuc11tnhi30l Firmware, Intel NUC 11 Pro Kit Nuc11tnhi70q Firmware, Intel NUC 11 Pro Kit Nuc11tnhi30p Firmware, and Intel NUC 11 Pro Kit Nuc11tnhi70l Firmware.
A privileged user can potentially exploit CVE-2023-29494 by leveraging improper input validation in the BIOS firmware of affected Intel NUCs to enable escalation of privilege through local access.
You can find more information about CVE-2023-29494 on the Intel Security Center advisory page: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00892.html