2024-01-19 21:00:28 +00:00
{
"id" : "CVE-2023-38541" ,
"sourceIdentifier" : "secure@intel.com" ,
"published" : "2024-01-19T20:15:10.627" ,
2024-01-30 15:00:29 +00:00
"lastModified" : "2024-01-30T14:28:38.110" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-01-19 21:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Insecure inherited permissions in some Intel HID Event Filter drivers for Windows 10 for some Intel NUC laptop software installers before version 2.2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
2024-01-30 15:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "Los permisos heredados inseguros en algunos controladores Intel HID Event Filter para Windows 10 para algunos instaladores de software de port\u00e1tiles Intel NUC anteriores a la versi\u00f3n 2.2.2.1 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
2024-01-19 21:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-01-30 15:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
2024-01-19 21:00:28 +00:00
{
"source" : "secure@intel.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 6.7 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 0.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2024-01-30 15:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-732"
}
]
} ,
2024-01-19 21:00:28 +00:00
{
"source" : "secure@intel.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-277"
}
]
}
] ,
2024-01-30 15:00:29 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:intel:hid_event_filter_driver:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.2.2.1" ,
"matchCriteriaId" : "2C574C63-EA47-4E43-9E2A-5CC0C1FC377E"
}
]
}
]
}
] ,
2024-01-19 21:00:28 +00:00
"references" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00964.html" ,
2024-01-30 15:00:29 +00:00
"source" : "secure@intel.com" ,
"tags" : [
"Vendor Advisory"
]
2024-01-19 21:00:28 +00:00
}
]
}