{ "id": "CVE-2023-27517", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:47.313", "lastModified": "2025-02-20T15:10:10.427", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in some Intel(R) Optane(TM) PMem software before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 may allow an athenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "El control de acceso inadecuado en algunos software Intel(R) Optane(TM) PMem anteriores a las versiones 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 puede permitir que un usuario autentificado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { "cvssMetricV31": [ { "source": "secure@intel.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "baseScore": 6.6, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.3, "impactScore": 5.2 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "secure@intel.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "01.00.00.3072", "versionEndExcluding": "01.00.00.3547", "matchCriteriaId": "EC0ABBD3-228C-4F02-8BC9-2545FC57E49A" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nma1xxd128gpsu4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EA3959A-A077-420F-9CF0-FCF926F78A1B" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nma1xxd128gpsuf:-:*:*:*:*:*:*:*", "matchCriteriaId": "C49C3C48-9452-417D-91A3-6282A5DF564E" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nma1xxd256gpsu4:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DF7A9E1-9610-42F8-BE3C-50B6C70EC2CE" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nma1xxd256gpsuf:-:*:*:*:*:*:*:*", "matchCriteriaId": "E29B5FFA-FD00-490D-9E33-2ADC23369773" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nma1xxd512gpsu4:-:*:*:*:*:*:*:*", "matchCriteriaId": "77357E64-833C-46E7-B84F-29F7ED3D0F31" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nma1xxd512gpsuf:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E373F80-B81E-4B7F-9407-DD918E39DA90" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "02.00.00.3423", "versionEndExcluding": "02.00.00.3915", "matchCriteriaId": "3CA941AF-27A6-47B7-B2BC-1D9A88444664" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nmb1xxd128gpsu4:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBED201B-A64E-441E-A952-B3C8C56F87C1" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nmb1xxd128gpsuf:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CD8FF9-DA6B-4293-8F4B-8B4A02C4C1E8" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nmb1xxd256gpsu4:-:*:*:*:*:*:*:*", "matchCriteriaId": "905C0399-6E5D-4D42-AA3D-D0ECC9117D9A" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nmb1xxd256gpsuf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E7380A6-CB51-4205-AAD7-AB75AB2638B5" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nmb1xxd512gpsu4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A86746AA-047D-4F7F-BD7F-0D18BF47F5EE" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nmb1xxd512gpsuf:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A3BC795-DAA0-48C5-BEBC-4A96B4FD3D0F" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*", "versionStartIncluding": "03.00.00.0302", "versionEndExcluding": "03.00.00.0483", "matchCriteriaId": "C5AB913F-BA30-4911-BC6F-083DFF14F9E6" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nmc2xxd128gpsu4:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D76D5AB-0CF5-40E5-8DA5-31E27F58F236" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nmc2xxd256gpsu4:-:*:*:*:*:*:*:*", "matchCriteriaId": "541DF110-3539-4F20-BAE9-039A969B1763" }, { "vulnerable": false, "criteria": "cpe:2.3:h:intel:nmc2xxd512gpsu4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F1535ED-13DC-4C08-BA2D-E8BE50C4A6CD" } ] } ] } ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html", "source": "secure@intel.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }