#VU60479 Insufficiently protected credentials in Hardware solutions


Published: 2022-02-09

Vulnerability identifier: #VU60479

Vulnerability risk: Low

CVSSv3.1: 6.6 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-33107

CWE-ID: CWE-522

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Active Management Technology SDK
Hardware solutions / Security hardware applicances
Intel Setup and Configuration Software (SCS)
Hardware solutions / Firmware
Intel Management Engine BIOS eXtensions (MEBx)
Hardware solutions / Firmware
Intel 500 series chipset
Hardware solutions / Firmware
Intel 400 Series Chipset
Hardware solutions / Firmware
8th Generation Intel Core Processors
Hardware solutions / Firmware
Pentium Gold processor series (G54XXU)
Hardware solutions / Firmware
Intel Celeron Processor 4000 Series
Hardware solutions / Firmware
Intel 300 Series Chipset
Hardware solutions / Firmware
Intel C240 Series Chipset
Hardware solutions / Firmware
Intel 200 Series Chipset
Hardware solutions / Firmware
Intel 100 Series Chipset
Hardware solutions / Firmware
Intel C230 series chipset
Hardware solutions / Firmware
Intel C420 Chipset
Hardware solutions / Firmware
Intel C620 Series Chipset
Hardware solutions / Firmware

Vendor:

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to insufficiently protected credentials in USB provisioning. An attacker with physical access can obtain credentials and gain elevated privileges on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability