Improper input validation in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html | Patch Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html - Patch, Vendor Advisory |
19 May 2023, 01:54
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html - Patch, Vendor Advisory | |
CPE | cpe:2.3:o:intel:server_system_m50cyp2ur312_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp2ur208:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp1mhcrlc_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_m50cyp2ur208_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp1mhcrac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp2mhsvac_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp1ur204:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp2ur312:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp2mhsvac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp2mfalac_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp2mfalac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp1mhcpac_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_m50cyp1ur212_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp2mhstac:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp1mhcpac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp2mhstac_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp1ur212:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp1mhcrlc:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_m50cyp1ur204_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp1mhcrac_firmware:*:*:*:*:*:*:*:* |
10 May 2023, 14:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-10 14:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-25776
Mitre link : CVE-2023-25776
CVE.ORG link : CVE-2023-25776
JSON object : View
Products Affected
intel
- server_system_d50tnp2mhstac_firmware
- server_system_m50cyp1ur212
- server_system_m50cyp2ur312_firmware
- server_system_d50tnp2mhsvac_firmware
- server_system_d50tnp1mhcrac
- server_system_d50tnp1mhcpac
- server_system_d50tnp1mhcpac_firmware
- server_system_m50cyp1ur212_firmware
- server_system_m50cyp1ur204_firmware
- server_system_d50tnp2mfalac
- server_system_d50tnp2mhstac
- server_system_m50cyp2ur208_firmware
- server_system_m50cyp2ur312
- server_system_d50tnp2mhsvac
- server_system_d50tnp1mhcrlc_firmware
- server_system_d50tnp2mfalac_firmware
- server_system_m50cyp1ur204
- server_system_m50cyp2ur208
- server_system_d50tnp1mhcrac_firmware
- server_system_d50tnp1mhcrlc
CWE