Privilege escalation in Intel BIOS firmware



Published: 2024-03-13
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-32282
CWE-ID CWE-362
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
12th Generation Intel Core Processors
Hardware solutions / Firmware

Intel Pentium Gold Processor Series
Hardware solutions / Firmware

Intel Celeron Processors
Hardware solutions / Firmware

11th Generation Intel Core Processors
Hardware solutions / Firmware

10th Generation Intel Core Processors
Hardware solutions / Firmware

Intel Core i7-11700T
Hardware solutions / Firmware

Intel Core i7-11700
Hardware solutions / Firmware

Intel Core i5-11400T
Hardware solutions / Firmware

Intel Core i5-11400
Hardware solutions / Firmware

Intel Core i5-11500T
Hardware solutions / Firmware

Intel Core i5-11500
Hardware solutions / Firmware

Intel Celeron J6413
Hardware solutions / Firmware

Intel Celeron N6211
Hardware solutions / Firmware

Intel Pentium J6425
Hardware solutions / Firmware

Intel Pentium N6415
Hardware solutions / Firmware

Intel Atom x6211E
Hardware solutions / Firmware

Intel Atom x6413E
Hardware solutions / Firmware

Intel Atom x6425E
Hardware solutions / Firmware

Intel Atom x6212RE
Hardware solutions / Firmware

Intel Atom x6414RE
Hardware solutions / Firmware

Intel Atom x6425RE
Hardware solutions / Firmware

Intel Atom x6427FE
Hardware solutions / Firmware

Intel Atom x6200FE
Hardware solutions / Firmware

Vendor Intel

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Race condition

EUVDB-ID: #VU87489

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-32282

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in BIOS firmware. A local privileged user can exploit the race and escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

12th Generation Intel Core Processors: All versions

Intel Pentium Gold Processor Series: All versions

Intel Celeron Processors: All versions

11th Generation Intel Core Processors: All versions

10th Generation Intel Core Processors: All versions

Intel Core i7-11700T: All versions

Intel Core i7-11700: All versions

Intel Core i5-11400T: All versions

Intel Core i5-11400: All versions

Intel Core i5-11500T: All versions

Intel Core i5-11500: All versions

Intel Celeron J6413: All versions

Intel Celeron N6211: All versions

Intel Pentium J6425: All versions

Intel Pentium N6415: All versions

Intel Atom x6211E: All versions

Intel Atom x6413E: All versions

Intel Atom x6425E: All versions

Intel Atom x6212RE: All versions

Intel Atom x6414RE: All versions

Intel Atom x6425RE: All versions

Intel Atom x6427FE: All versions

Intel Atom x6200FE: All versions

External links

http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00929.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###