2023-11-14 21:00:23 +00:00
{
"id" : "CVE-2023-34997" ,
"sourceIdentifier" : "secure@intel.com" ,
"published" : "2023-11-14T19:15:28.590" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:07:47.940" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-11-14 21:00:23 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Insecure inherited permissions in the installer for some Intel Server Configuration Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access."
2023-11-21 21:00:21 +00:00
} ,
{
"lang" : "es" ,
"value" : "Los permisos heredados inseguros en el instalador de algunos software de Intel Server Configuration Utility anteriores a la versi\u00f3n 16.0.9 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
2023-11-14 21:00:23 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-11-21 21:00:21 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "secure@intel.com" ,
"type" : "Secondary" ,
2023-11-21 21:00:21 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" ,
"baseScore" : 6.7 ,
"baseSeverity" : "MEDIUM" ,
2023-11-21 21:00:21 +00:00
"attackVector" : "LOCAL" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "HIGH" ,
2023-11-21 21:00:21 +00:00
"privilegesRequired" : "LOW" ,
2024-12-08 03:06:42 +00:00
"userInteraction" : "REQUIRED" ,
2023-11-21 21:00:21 +00:00
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-11-21 21:00:21 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 0.8 ,
2023-11-21 21:00:21 +00:00
"impactScore" : 5.9
} ,
2023-11-14 21:00:23 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-11-14 21:00:23 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2023-11-14 21:00:23 +00:00
"attackVector" : "LOCAL" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "LOW" ,
2023-11-14 21:00:23 +00:00
"privilegesRequired" : "LOW" ,
2024-12-08 03:06:42 +00:00
"userInteraction" : "NONE" ,
2023-11-14 21:00:23 +00:00
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-11-14 21:00:23 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 1.8 ,
2023-11-14 21:00:23 +00:00
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2023-11-21 21:00:21 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "secure@intel.com" ,
"type" : "Secondary" ,
2023-11-21 21:00:21 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-277"
2023-11-21 21:00:21 +00:00
}
]
} ,
2023-11-14 21:00:23 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-11-14 21:00:23 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-732"
2023-11-14 21:00:23 +00:00
}
]
}
] ,
2023-11-21 21:00:21 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:intel:server_configuration_utility:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.9" ,
"matchCriteriaId" : "BE9882BF-1158-4A70-9B10-C2F15FD95591"
}
]
}
]
}
] ,
2023-11-14 21:00:23 +00:00
"references" : [
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html" ,
2023-11-21 21:00:21 +00:00
"source" : "secure@intel.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-11-14 21:00:23 +00:00
}
]
}