Out of bounds write in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html | Patch Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
21 Nov 2024, 07:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.9 |
18 May 2023, 19:06
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html - Patch, Vendor Advisory | |
CPE | cpe:2.3:o:intel:server_system_m50cyp2ur312_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp2ur208:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp1mhcrlc_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_m50cyp2ur208_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp1mhcrac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp2mhsvac_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp1ur204:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp2ur312:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp2mhsvac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp2mfalac_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp2mfalac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp1mhcpac_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_m50cyp1ur212_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp2mhstac:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp1mhcpac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp2mhstac_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp1ur212:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp1mhcrlc:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_m50cyp1ur204_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp1mhcrac_firmware:*:*:*:*:*:*:*:* |
10 May 2023, 14:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-10 14:15
Updated : 2024-11-21 07:44
NVD link : CVE-2023-22442
Mitre link : CVE-2023-22442
CVE.ORG link : CVE-2023-22442
JSON object : View
Products Affected
intel
- server_system_d50tnp2mhstac_firmware
- server_system_m50cyp1ur212
- server_system_m50cyp2ur312_firmware
- server_system_d50tnp2mhsvac_firmware
- server_system_d50tnp1mhcrac
- server_system_d50tnp1mhcpac
- server_system_d50tnp1mhcpac_firmware
- server_system_m50cyp1ur212_firmware
- server_system_m50cyp1ur204_firmware
- server_system_d50tnp2mfalac
- server_system_d50tnp2mhstac
- server_system_m50cyp2ur208_firmware
- server_system_m50cyp2ur312
- server_system_d50tnp2mhsvac
- server_system_d50tnp1mhcrlc_firmware
- server_system_d50tnp2mfalac_firmware
- server_system_m50cyp1ur204
- server_system_m50cyp2ur208
- server_system_d50tnp1mhcrac_firmware
- server_system_d50tnp1mhcrlc
CWE
CWE-787
Out-of-bounds Write