Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-34163
Analyzed
More InfoOfficial Page
Source-secure@intel.com
View Known Exploited Vulnerability (KEV) details
Published At-14 Aug, 2024 | 14:15
Updated At-12 Sep, 2024 | 18:59

Improper input validation in firmware for some Intel(R) NUC may allow a privileged user to potentially enableescalation of privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.7HIGH
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.18.2HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Secondary3.17.5HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CPE Matches

Intel Corporation
intel
>>nuc_x15_laptop_kit_lapbc510_firmware>>Versions before 0083(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapbc510>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapbc710_firmware>>Versions before 0083(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapbc710>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapac71g_firmware>>Versions before 0065(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapac71g_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapac71g>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapac71g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapac71h_firmware>>Versions before 0065(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapac71h_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapac71h>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapac71h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc51e_firmware>>Versions before 0048(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapkc51e_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc51e>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapkc51e:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc71e_firmware>>Versions before 0048(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapkc71e_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc71e>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapkc71e:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc71f_firmware>>Versions before 0048(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapkc71f_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc71f>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapkc71f:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_laprc510_firmware>>Versions before 0066(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_laprc510_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_laprc510>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_laprc510:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_laprc710_firmware>>Versions before 0066(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_laprc710_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_laprc710>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_laprc710:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE-20Secondarysecure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01022.htmlsecure@intel.com
Vendor Advisory
Change History
0Changes found

Details not found