ID CVE-2017-3718
Summary Improper setting of device configuration in system firmware for Intel(R) NUC kits may allow a privileged user to potentially enable escalation of privilege via physical access.
References
Vulnerable Configurations
  • cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_d33217gke:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_d33217gke:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_d53427rke:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_d53427rke:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_d54250wyb:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_d54250wyb:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_de3815tybe:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_de3815tybe:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_dn2820fykh:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_dn2820fykh:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc5cpyh:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc5cpyh:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc5i3myhe:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc5i3myhe:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc5i5myhe:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc5i5myhe:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc5i7ryh:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc5i7ryh:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc6i5syh:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc6i5syh:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc6i7kyk:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc6i7kyk:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc7i5dnke:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc7i5dnke:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc7i7dnke:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc7i7dnke:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:compute_stick_stk1aw32sc:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:compute_stick_stk1aw32sc:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00144.html
Last major update 03-10-2019 - 00:03
Published 10-01-2019 - 20:29
Last modified 03-10-2019 - 00:03
Back to Top