First published: Tue Nov 14 2023(Updated: )
Path transversal in some Intel(R) NUC Kits & Mini PCs - NUC8i7HVK & NUC8HNK USB Type C power delivery controller installatio software before version 1.0.10.3 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Usb Type C Power Delivery Controller | <1.0.10.3 | |
Intel Nuc 8 Business Nuc8i7hnkqc | ||
Intel Nuc 8 Enthusiast Nuc8i7hvkva | ||
Intel Nuc 8 Enthusiast Nuc8i7hvkvaw | ||
Intel Nuc Kit Nuc8i7hnk | ||
Intel Nuc Kit Nuc8i7hvk |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32655 is a vulnerability that allows an authenticated user to potentially enable escalation of privilege via local access in some Intel(R) NUC Kits & Mini PCs - NUC8i7HVK & NUC8HNK USB Type C power delivery controller installation software before version 1.0.10.3 for Windows.
The severity of CVE-2023-32655 is high with a severity value of 7.3.
CVE-2023-32655 affects Intel USB Type C Power Delivery Controller version up to exclusive 1.0.10.3 for Windows.
No, Intel NUC 8 Business NUC8i7HNKQC and Intel NUC 8 Enthusiast NUC8i7HVKVA are not vulnerable to CVE-2023-32655.
To fix CVE-2023-32655, update the Intel USB Type C Power Delivery Controller installation software to version 1.0.10.3 or later for Windows.