CVE-2016-8103

SMM call out in all Intel Branded NUC Kits allows a local privileged user to access the System Management Mode and take full control of the platform.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:intel:city_bios:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:intel:canyon_bios:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc6i7kyb:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:intel:canyon_bios:*:*:*:*:*:*:*:*
OR cpe:2.3:h:intel:nuc5cpyh:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc5pgyh:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc5ppyh:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:intel:city_bios:ccsklm30.86a:*:*:*:*:*:*:*
cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:intel:canyon_bios:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:dn2820fyb:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:intel:city_bios:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:intel:swift_canyon_bios:*:*:*:*:*:*:*:*
OR cpe:2.3:h:intel:nuc6i3syb:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc6i5syb:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:intel:citry_bios:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:stk1aw32sc:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:intel:canyon_bios:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc5i3mybe:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:intel:canyon_bios:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc5i3mybe:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:intel:city_bios:*:*:*:*:*:*:*:*
OR cpe:2.3:h:intel:stk1a32sc:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:stk1aw32sc:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:intel:canyon_bios:*:*:*:*:*:*:*:*
OR cpe:2.3:h:intel:nuc5i3ryb:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc5i5ryb:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc5i7rykh:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/95012 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/95012 - Third Party Advisory, VDB Entry
References () https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00057&languageid=en-fr - Vendor Advisory () https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00057&languageid=en-fr - Vendor Advisory

Information

Published : 2016-12-08 17:59

Updated : 2024-11-21 02:58


NVD link : CVE-2016-8103

Mitre link : CVE-2016-8103

CVE.ORG link : CVE-2016-8103


JSON object : View

Products Affected

intel

  • nuc5pgyh
  • nuc5i5ryb
  • stk2m3w64cc
  • citry_bios
  • nuc5cpyh
  • canyon_bios
  • swift_canyon_bios
  • nuc5i7rykh
  • nuc5ppyh
  • nuc6i5syb
  • stk1aw32sc
  • dn2820fyb
  • nuc6i7kyb
  • nuc5i3ryb
  • nuc5i3mybe
  • nuc6i3syb
  • stk1a32sc
  • stk2mv64cc
  • city_bios
CWE
CWE-264

Permissions, Privileges, and Access Controls