First published: Fri Jan 19 2024(Updated: )
Uncontrolled search path in some Intel NUC Pro Software Suite Configuration Tool software installers before version 3.0.0.6 may allow an authenticated user to potentially enable denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel NUC Pro Software Suite | <=3.0.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32272 has been classified with a medium severity rating due to its potential for denial of service exploitation.
To mitigate CVE-2023-32272, users should update to Intel NUC Pro Software Suite version 3.0.0.6 or later.
CVE-2023-32272 affects installations of the Intel NUC Pro Software Suite versions prior to 3.0.0.6.
The impact of CVE-2023-32272 may allow authenticated users to perform denial of service by leveraging the uncontrolled search path in the software installers.
No, CVE-2023-32272 requires local access, as it can only be exploited by an authenticated user on the affected system.