All the vulnerabilites related to intel - nuc_8_rugged_kit_nuc8cchkrn
cve-2023-32617
Vulnerability from cvelistv5
Published
2023-08-11 02:37
Modified
2024-08-02 15:25
Summary
Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:35.693Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-11T02:37:27.420Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-32617",
    "datePublished": "2023-08-11T02:37:27.420Z",
    "dateReserved": "2023-06-09T03:00:03.568Z",
    "dateUpdated": "2024-08-02T15:25:35.693Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-22312
Vulnerability from cvelistv5
Published
2023-05-10 13:16
Modified
2024-08-02 10:07
Summary
Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:07:06.191Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) NUC BIOS firmware",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-10T13:16:46.656Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-22312",
    "datePublished": "2023-05-10T13:16:46.656Z",
    "dateReserved": "2023-03-01T18:23:25.257Z",
    "dateUpdated": "2024-08-02T10:07:06.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-26124
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2024-08-03 04:56
Summary
Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T04:56:37.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version CHAPLCEL.0059"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-14T17:46:22.730Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-26124",
    "datePublished": "2022-11-11T15:48:53.869Z",
    "dateReserved": "2022-03-02T00:32:11.638Z",
    "dateUpdated": "2024-08-03T04:56:37.646Z",
    "requesterUserId": "524a9a6b-3515-4b97-ab85-1a9a79493852",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 08:03
Summary
Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel nuc_kit_nuc7i7bnhx1_firmware -
intel nuc_kit_nuc7i7bnhx1 -
intel nuc_7_home_nuc7i5bnkp_firmware -
intel nuc_7_home_nuc7i5bnkp -
intel nuc_7_home_nuc7i3bnhxf_firmware -
intel nuc_7_home_nuc7i3bnhxf -
intel nuc_7_enthusiast_nuc7i7bnkq_firmware -
intel nuc_7_enthusiast_nuc7i7bnkq -
intel nuc_kit_nuc7i3bnhx1_firmware -
intel nuc_kit_nuc7i3bnhx1 -
intel nuc_7_enthusiast_nuc7i7bnhxg_firmware -
intel nuc_7_enthusiast_nuc7i7bnhxg -
intel nuc_7_home_nuc7i5bnhxf_firmware -
intel nuc_7_home_nuc7i5bnhxf -
intel nuc_kit_nuc7i5bnhx1_firmware -
intel nuc_kit_nuc7i5bnhx1 -
intel nuc_board_nuc7i7bnb_firmware -
intel nuc_board_nuc7i7bnb -
intel nuc_board_nuc7i5bnb_firmware -
intel nuc_board_nuc7i5bnb -
intel nuc_board_nuc7i3bnb_firmware -
intel nuc_board_nuc7i3bnb -
intel nuc_kit_nuc7i5bnh_firmware -
intel nuc_kit_nuc7i5bnh -
intel nuc_kit_nuc7i3bnk_firmware -
intel nuc_kit_nuc7i3bnk -
intel nuc_kit_nuc7i5bnk_firmware -
intel nuc_kit_nuc7i5bnk -
intel nuc_kit_nuc7i7bnh_firmware -
intel nuc_kit_nuc7i7bnh -
intel nuc_kit_nuc7i3bnh_firmware -
intel nuc_kit_nuc7i3bnh -
intel nuc_8_rugged_kit_nuc8cchkrn_firmware -
intel nuc_8_rugged_kit_nuc8cchkrn -
intel nuc_8_rugged_board_nuc8cchbn_firmware -
intel nuc_8_rugged_board_nuc8cchbn -
intel nuc_8_rugged_kit_nuc8cchkr_firmware -
intel nuc_8_rugged_kit_nuc8cchkr -
intel nuc_board_nuc8cchb_firmware -
intel nuc_board_nuc8cchb -
intel nuc_kit_nuc6cayh_firmware -
intel nuc_kit_nuc6cayh -
intel nuc_kit_nuc6cays_firmware -
intel nuc_kit_nuc6cays -
intel compute_stick_stk2mv64cc_firmware -
intel compute_stick_stk2mv64cc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7bnhx1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3B790D-1462-41CF-B188-59D2903C02D3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7bnhx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7873614F-168F-4307-B38B-672262623985",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_7_home_nuc7i5bnkp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B6CC54-AB90-4DCC-8FF5-C465447ADD93",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_7_home_nuc7i5bnkp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19389975-C699-4F08-BE73-2C7D47F8E820",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_7_home_nuc7i3bnhxf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90528F9-9C3D-433F-B88F-FA1DC0997956",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_7_home_nuc7i3bnhxf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B41E2FE-EB38-49B1-9C51-8FF050FE2BB6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_7_enthusiast_nuc7i7bnkq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5A3413-991E-4A66-A99F-DC94DB0D9526",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_7_enthusiast_nuc7i7bnkq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C2A2DCF-D3E0-4483-A0E1-7A6D51D8D3D0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnhx1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F962C80E-7A51-4219-93B0-BE412F8742CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnhx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEF4AE10-4F3E-4182-AFF2-8B13B035CC92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_7_enthusiast_nuc7i7bnhxg_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "067400DD-63DF-46CC-83F4-AE2CD02AE829",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_7_enthusiast_nuc7i7bnhxg:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2560D6C-BA13-40E7-B3DC-DCF86D57C875",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_7_home_nuc7i5bnhxf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10E47572-D104-44A3-A5F0-D75759B6D3CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_7_home_nuc7i5bnhxf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "463D9247-C8C5-4A1C-A876-3777C43850D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnhx1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D00D724-60A9-4B56-83BE-FE39E0FACA38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnhx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B4DEC1-6AB3-4142-9435-EAE87DB1E4A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i7bnb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BFD15B4-802D-407F-9647-CC59E60735B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i7bnb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B9A4D6-7550-4114-83BF-CA58060BEA0A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i5bnb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CBEC113-9DBF-4277-A98F-2A84025A6B88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i5bnb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA36E316-A0D1-4D7C-B793-7EE5166A7D0B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i3bnb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB320E41-9D1B-450E-8F73-6C8353B174CE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i3bnb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF05F366-9CD4-439E-9D60-6F9D6AAC65E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnh_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A79127AD-AF8B-4C93-AAB9-741703448EC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F735D1DB-9676-490C-93C3-AAAD3F05AEBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD48BED-604A-4225-B8D5-1B77B06F7A94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97229EAB-0D96-42FD-B1CD-ADE4616187D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5329CB04-060B-4D4C-A5B4-B6788FD5DC0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD132751-6882-4C70-8ED9-AFFE0A771326",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7bnh_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE36CFFB-07F6-4E42-86F4-CDE408B790F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0DE3105-8418-4CA3-80B0-5EE4E394D58F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnh_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24C0A55F-1F37-4DED-94F3-A513D473701B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24A5364F-B4EB-44C3-8B23-3F410F9CE30D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkrn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB90C1F7-4DAE-40B5-90AA-76000B4BFE20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D7F2839-5138-4E20-9DF9-93DA0F1CAD07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_8_rugged_board_nuc8cchbn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E519BA-A66A-4507-AF47-3DBB551150F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_rugged_board_nuc8cchbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF64F57-839A-4911-BCEA-7083B67F6D68",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62E5293-CDFA-4EDB-AD33-0D8F72FD9E06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "463C2810-EF94-49BC-B62B-F712212C6415",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FA9AD2D-D081-4675-8F4D-94E832C67E1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1DE8F9-9716-4A8E-B355-080CFB3E3696",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_stick_stk2mv64cc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EDC137-8198-4EC9-A3C9-FFF505CD0848",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B0C9D80-37A3-43E5-B818-55532F613436",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access."
    }
  ],
  "id": "CVE-2023-32617",
  "lastModified": "2024-11-21T08:03:42.537",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:32.687",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-10 14:15
Modified
2024-11-21 07:44
Summary
Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel nuc_11_performance_kit_nuc11pahi70z_firmware *
intel nuc_11_performance_kit_nuc11pahi70z -
intel nuc_11_performance_kit_nuc11pahi50z_firmware *
intel nuc_11_performance_kit_nuc11pahi50z -
intel nuc_11_performance_kit_nuc11pahi30z_firmware *
intel nuc_11_performance_kit_nuc11pahi30z -
intel nuc_11_performance_kit_nuc11pahi3_firmware *
intel nuc_11_performance_kit_nuc11pahi3 -
intel nuc_11_performance_kit_nuc11pahi5_firmware *
intel nuc_11_performance_kit_nuc11pahi5 -
intel nuc_11_performance_kit_nuc11pahi7_firmware *
intel nuc_11_performance_kit_nuc11pahi7 -
intel nuc_11_performance_kit_nuc11paki3_firmware *
intel nuc_11_performance_kit_nuc11paki3 -
intel nuc_11_performance_kit_nuc11paki5_firmware *
intel nuc_11_performance_kit_nuc11paki5 -
intel nuc_11_performance_kit_nuc11paki7_firmware *
intel nuc_11_performance_kit_nuc11paki7 -
intel nuc_11_performance_mini_pc_nuc11paqi50wa_firmware *
intel nuc_11_performance_mini_pc_nuc11paqi50wa -
intel nuc_11_performance_mini_pc_nuc11paqi70qa_firmware *
intel nuc_11_performance_mini_pc_nuc11paqi70qa -
intel nuc_11_compute_element_cm11ebi38w_firmware *
intel nuc_11_compute_element_cm11ebi38w -
intel nuc_11_compute_element_cm11ebi58w_firmware *
intel nuc_11_compute_element_cm11ebi58w -
intel nuc_11_compute_element_cm11ebi716w_firmware *
intel nuc_11_compute_element_cm11ebi716w -
intel nuc_11_compute_element_cm11ebc4w_firmware *
intel nuc_11_compute_element_cm11ebc4w -
intel nuc_m15_laptop_kit_lapbc710_firmware *
intel nuc_m15_laptop_kit_lapbc710 -
intel nuc_m15_laptop_kit_lapbc510_firmware *
intel nuc_m15_laptop_kit_lapbc510 -
intel lapkc51e_firmware *
intel lapkc51e -
intel lapkc71e_firmware *
intel lapkc71e -
intel lapkc71f_firmware *
intel lapkc71f -
intel nuc11btmi7_firmware *
intel nuc11btmi7 -
intel nuc11dbbi7_firmware *
intel nuc11dbbi7 -
intel nuc11btmi9_firmware *
intel nuc11btmi9 -
intel nuc11dbbi9_firmware *
intel nuc11dbbi9 -
intel nuc_11_enthusiast_kit_nuc11phki7c_firmware *
intel nuc_11_enthusiast_kit_nuc11phki7c -
intel nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware *
intel nuc_11_enthusiast_mini_pc_nuc11phki7caa -
intel nuc_board_nuc8cchb_firmware *
intel nuc_board_nuc8cchb -
intel nuc_8_rugged_board_nuc8cchbn_firmware *
intel nuc_8_rugged_board_nuc8cchbn -
intel nuc_8_rugged_kit_nuc8cchkrn_firmware *
intel nuc_8_rugged_kit_nuc8cchkrn -
intel nuc_8_rugged_kit_nuc8cchkr_firmware *
intel nuc_8_rugged_kit_nuc8cchkr -
intel nuc_11_pro_kit_nuc11tnkv50z_firmware *
intel nuc_11_pro_kit_nuc11tnkv50z -
intel nuc_11_pro_kit_nuc11tnhv70l_firmware *
intel nuc_11_pro_kit_nuc11tnhv70l -
intel nuc_11_pro_kit_nuc11tnhv50l_firmware *
intel nuc_11_pro_kit_nuc11tnhv50l -
intel nuc_11_pro_board_nuc11tnbv7_firmware *
intel nuc_11_pro_board_nuc11tnbv7 -
intel nuc_11_pro_kit_nuc11tnkv5_firmware *
intel nuc_11_pro_kit_nuc11tnkv5 -
intel nuc_11_pro_kit_nuc11tnkv7_firmware *
intel nuc_11_pro_kit_nuc11tnkv7 -
intel nuc_11_pro_kit_nuc11tnhv5_firmware *
intel nuc_11_pro_kit_nuc11tnhv5 -
intel nuc_11_pro_mini_pc_nuc11tnkv5_firmware *
intel nuc_11_pro_mini_pc_nuc11tnkv5 -
intel nuc_11_pro_mini_pc_nuc11tnkv7_firmware *
intel nuc_11_pro_mini_pc_nuc11tnkv7 -
intel nuc_11_pro_kit_nuc11tnhv7_firmware *
intel nuc_11_pro_kit_nuc11tnhv7 -
intel nuc_11_pro_board_nuc11tnbv5_firmware *
intel nuc_11_pro_board_nuc11tnbv5 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi70z_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8795375D-CC31-46BC-9FC4-947ED8DA273E",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi70z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F1BB2C-00A9-44DE-ADE2-C910E12AC664",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi50z_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "78CE437C-580A-41F7-8349-CFE56228561E",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi50z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45F55CB5-5E7C-460F-8B49-F2BA47102884",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi30z_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F8200E-BBC1-4A0A-A86B-1E28A7ACCCD0",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi30z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8756CBA9-24C8-49E0-8622-95E25DAB64AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "540C9DB6-EB22-4598-9110-01A8C9A003DA",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53358E28-1529-478C-A1DC-39F05250C749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B1DED6-87F5-44FC-96D2-7891AC336A3A",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625FA81A-2E10-4910-8310-27C9577AB8D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F3E33FC-97AE-4758-B20C-764595EFC396",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15EA0B24-5433-4188-82A4-3019247C3AE4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "520B5A6B-F508-4325-A09A-36381AB53661",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B7156E-602E-4335-A0B2-A1E679194E54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "756BA54D-1097-48CA-8170-16D6140C9764",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46277E03-FB58-4FDB-834D-50E46D634800",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AC435E-7DDE-40DD-91F4-96603480BF9B",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "044D872A-7C4D-45C8-9B81-B40D1B05A5A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C4FCDEB-ED89-4BC7-96C0-3C798EA053F5",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71878455-5816-4C4E-9595-B44DCFAAB80C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53176ADE-C6B4-49C0-ADF1-DEB6F71A9CFF",
              "versionEndExcluding": "patgl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B23996D-1C22-42DF-8752-E5490D34AD64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDFB6D0-2255-4069-9C64-720DBF401650",
              "versionEndExcluding": "ebtgl357.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DA027A1-2326-4CFE-A331-470C66D5BDA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F758DD7E-E88D-4F66-86B9-AF8E11EF1C9C",
              "versionEndExcluding": "ebtgl357.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B55C553-3AE9-465A-ABB4-76E06E9ADE29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3F5BB1B-B15A-4C33-82BD-771D2908FA14",
              "versionEndExcluding": "ebtgl357.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E862DC84-0456-4134-AD6A-E1858787627D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4w_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "644B0A12-2F88-446A-A366-D572B0851FFF",
              "versionEndExcluding": "ebtgl357.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A673E79C-094C-41C2-AD4C-3633BE4EDBB6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C1D9ED1-01C7-446F-B919-D8A7A34BAC74",
              "versionEndExcluding": "bctgl357.0078",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7074EC4C-7096-47D1-9CA8-9C4784DBF72D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4846FED8-7898-4B0A-9B61-327B872552D5",
              "versionEndExcluding": "bctgl357.0078",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29817A9E-9FDE-421B-950A-4053F9D22FD1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapkc51e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D7D32C-C22B-4DD5-82E2-D09D23068DD8",
              "versionEndExcluding": "kctgl357.0044",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapkc51e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3E9D7F-0D8B-4280-8A9F-7AA4D252DAE7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapkc71e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E219A39-9139-4F6B-BF2B-6DC04B59576F",
              "versionEndExcluding": "kctgl357.0044",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapkc71e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EDE2B4A-41A9-4589-BA27-C97A535AE75F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapkc71f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5F6668A-2C8F-45FD-9787-FB6EF0BFFF24",
              "versionEndExcluding": "kctgl357.0044",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapkc71f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4746844A-4F96-4866-B9E2-BB4FCA3312F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc11btmi7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBDC8E9-5A75-4F61-B1E6-BCF6A716C27E",
              "versionEndExcluding": "dbtgl579.0065",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc11btmi7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09A302AE-67BC-48AD-A093-2BC98A8C3716",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc11dbbi7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C6B8E1-39D1-4ABA-95A8-8B4B065BB56B",
              "versionEndExcluding": "dbtgl579.0065",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc11dbbi7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "747BFD86-BFA0-4C28-9949-CD7E264583F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc11btmi9_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E4C58-D823-4B05-8890-3577E896AFC9",
              "versionEndExcluding": "dbtgl579.0065",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc11btmi9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB6761DE-7D65-44E1-A1B3-6B6AC1E2A719",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc11dbbi9_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D97BC1B-4BC5-457D-A7C6-1C96F18CC4EB",
              "versionEndExcluding": "dbtgl579.0065",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc11dbbi9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA398B86-473B-4BB9-8355-E72C227B9B21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1554DE8-3939-4FD6-8065-C8897E01B719",
              "versionEndExcluding": "phtgl579.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B29DE251-B4BC-4716-99DD-35F4FEE788F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "536FCDA0-E506-4CB0-BFDB-EFB6D66746B2",
              "versionEndExcluding": "phtgl579.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6319E7BC-693D-44A9-A342-65E94E477B81",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C529706-65F4-4010-9590-26C9CC33B5B2",
              "versionEndExcluding": "chaplcel.0061",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_8_rugged_board_nuc8cchbn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89244081-CAF5-47C2-8805-E42119B40D8F",
              "versionEndExcluding": "chaplcel.0061",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_rugged_board_nuc8cchbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF64F57-839A-4911-BCEA-7083B67F6D68",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkrn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B913C7E-3DD0-45B0-B26C-1FA5E9EBCB81",
              "versionEndExcluding": "chaplcel.0061",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D7F2839-5138-4E20-9DF9-93DA0F1CAD07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "172656E6-0E33-40FB-BE60-3A2AAA1083B8",
              "versionEndExcluding": "chaplcel.0061",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnkv50z_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3A57888-2BEF-4613-BFAB-5CD5C1E5A373",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnkv50z:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA1F566C-DC4E-4A81-B996-B7F0871386A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv70l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D7A419D-DBCB-484C-A305-4231631E47F4",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv70l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2B7654-6F11-476C-A16E-9406E57BF32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv50l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C92FF0-F018-469E-8228-28A2D833E90B",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv50l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B8190B3-BE90-48BB-A428-BDA2CB46422C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbv7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B26B86B6-73DC-41DB-88E7-02C1D353145F",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbv7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1EDB8DB-51B6-4E79-858C-C6959D1B12AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnkv5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F903F7CA-0DC1-4A89-A8EF-CEF55C644E57",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnkv5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C605EC9-5CB7-4273-944B-21AAE5CA8622",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnkv7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD830A10-F256-41D2-AF1C-0D616468DE1C",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnkv7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41D67D6E-BADA-4D58-8735-433CEB3EAFE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DB8C8E-1288-4F5E-8B7C-58F0A1B29F7F",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81E84C91-8152-48B3-8C7A-1F3288915C58",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_mini_pc_nuc11tnkv5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE6B5E13-9BCA-4A6F-830A-4CC01DEAED3E",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_mini_pc_nuc11tnkv5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A6FCC51-5800-4543-9D70-ED0AF393E4D0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_mini_pc_nuc11tnkv7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E118D380-8433-4D6A-832A-EC07CD7C0AE4",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_mini_pc_nuc11tnkv7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B4BB0F-D1B1-4121-BA14-80EAC2D1C54B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6887CB7A-8A35-4A51-8066-F6212B1A3846",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "292BB07B-F5FE-47A4-A334-E87A3EF6B7A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbv5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE909AE-98F3-4142-9D91-C5A1F2021663",
              "versionEndExcluding": "tntglv57.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbv5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B38C7212-47F4-4AAA-A9B6-373850BE0BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access."
    }
  ],
  "id": "CVE-2023-22312",
  "lastModified": "2024-11-21T07:44:30.403",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.6,
        "impactScore": 6.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-10T14:15:26.943",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 06:53
Summary
Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkrn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C37367-194D-4CF2-840C-69FCAB9DD70C",
              "versionEndExcluding": "chaplcel.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D7F2839-5138-4E20-9DF9-93DA0F1CAD07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17A49D51-56EE-496F-A1CC-D06A54D9134B",
              "versionEndExcluding": "chaplcel.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_8_rugged_board_nuc8cchbn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "09017B96-98B5-4F52-AE3C-32AFE73E9F45",
              "versionEndExcluding": "chaplcel.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_rugged_board_nuc8cchbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF64F57-839A-4911-BCEA-7083B67F6D68",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6FFB15-E807-467F-BC34-253C02C3B594",
              "versionEndExcluding": "chaplcel.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Las restricciones inadecuadas del b\u00fafer en el firmware del BIOS para algunas placas Intel(R) NUC, placas Intel(R) NUC 8, placas Intel(R) NUC 8 resistentes y kits resistentes Intel(R) NUC 8 anteriores a la versi\u00f3n CHAPLCEL.0059 pueden permitir un usuario privilegiado para permitir potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2022-26124",
  "lastModified": "2024-11-21T06:53:28.693",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 6.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-11T16:15:12.620",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}