First published: Tue Nov 14 2023(Updated: )
Path transversal in some Intel(R) NUC Kits & Mini PCs - NUC8i7HVK & NUC8HNK USB Type C power delivery controller installatio software before version 1.0.10.3 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel USB Type-C Power Delivery Controller | <1.0.10.3 | |
Intel NUC 8 Business NUC8i7HNKQC Firmware | ||
Intel NUC 8 Enthusiast NUC8i7HVKVAW | ||
Intel NUC 8 Enthusiast NUC8i7HVKVAW Firmware | ||
Intel NUC kit NUC8i7HNK | ||
Intel NUC Kit NUC8i7HVK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32655 is a vulnerability that allows an authenticated user to potentially enable escalation of privilege via local access in some Intel(R) NUC Kits & Mini PCs - NUC8i7HVK & NUC8HNK USB Type C power delivery controller installation software before version 1.0.10.3 for Windows.
The severity of CVE-2023-32655 is high with a severity value of 7.3.
CVE-2023-32655 affects Intel USB Type C Power Delivery Controller version up to exclusive 1.0.10.3 for Windows.
No, Intel NUC 8 Business NUC8i7HNKQC and Intel NUC 8 Enthusiast NUC8i7HVKVA are not vulnerable to CVE-2023-32655.
To fix CVE-2023-32655, update the Intel USB Type C Power Delivery Controller installation software to version 1.0.10.3 or later for Windows.