#VU63083 Improper access control


Published: 2022-05-12 | Updated: 2022-05-16

Vulnerability identifier: #VU63083

Vulnerability risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-33123

CWE-ID: CWE-284

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
2nd Generation Intel Xeon Scalable Processors
Hardware solutions / Firmware
Intel Xeon D Processors
Hardware solutions / Firmware
3rd Generation Intel Xeon Scalable Processors
Hardware solutions / Firmware
10th Generation Intel Core Processors
Hardware solutions / Firmware
8th Generation Intel Core Processors
Hardware solutions / Firmware
7th Generation Intel Core Processors
Hardware solutions / Firmware
Intel Core X-series Processor
Hardware solutions / Firmware
Intel Xeon W Processors
Hardware solutions / Firmware
Intel Xeon Processor E Family
Hardware solutions / Firmware
Intel Xeon Processor E3 v6 Family
Hardware solutions / Firmware
Intel Xeon Processor E3 v5 Family
Hardware solutions / Firmware
Intel Xeon Processor E7 v4 Family
Hardware solutions / Firmware
Intel Xeon Processor E5 v4 Family
Hardware solutions / Firmware
Rocket Lake Xeon
Hardware solutions / Other hardware appliances
9th Generation Intel Core Processors
Client/Desktop applications / Web browsers

Vendor: Intel

Description

The vulnerability allows a local user to escalate privileges on the system

The vulnerability exists due to improper access restrictions in the BIOS authenticated code module. A local user can obtain elevated privileges on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

2nd Generation Intel Xeon Scalable Processors: All versions

Intel Xeon D Processors: All versions

Rocket Lake Xeon: All versions

3rd Generation Intel Xeon Scalable Processors: All versions

9th Generation Intel Core Processors: All versions

10th Generation Intel Core Processors: All versions

8th Generation Intel Core Processors: All versions

7th Generation Intel Core Processors: All versions

Intel Core X-series Processor: All versions

Intel Xeon W Processors: All versions

Intel Xeon Processor E Family: All versions

Intel Xeon Processor E3 v6 Family: All versions

Intel Xeon Processor E3 v5 Family: All versions

Intel Xeon Processor E7 v4 Family: All versions

Intel Xeon Processor E5 v4 Family: All versions


CPE

External links
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability