#VU63083 Improper access control in Intel products - CVE-2021-33123
Published: May 12, 2022 / Updated: May 16, 2022
Vulnerability identifier: #VU63083
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-33123
CWE-ID: CWE-284
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
2nd Generation Intel Xeon Scalable Processors
Intel Xeon D Processors
3rd Generation Intel Xeon Scalable Processors
10th Generation Intel Core Processors
8th Generation Intel Core Processors
7th Generation Intel Core Processors
Intel Core X-series Processor
Intel Xeon W Processors
Intel Xeon Processor E Family
Intel Xeon Processor E3 v6 Family
Intel Xeon Processor E3 v5 Family
Intel Xeon Processor E7 v4 Family
Intel Xeon Processor E5 v4 Family
Rocket Lake Xeon
9th Generation Intel Core Processors
2nd Generation Intel Xeon Scalable Processors
Intel Xeon D Processors
3rd Generation Intel Xeon Scalable Processors
10th Generation Intel Core Processors
8th Generation Intel Core Processors
7th Generation Intel Core Processors
Intel Core X-series Processor
Intel Xeon W Processors
Intel Xeon Processor E Family
Intel Xeon Processor E3 v6 Family
Intel Xeon Processor E3 v5 Family
Intel Xeon Processor E7 v4 Family
Intel Xeon Processor E5 v4 Family
Rocket Lake Xeon
9th Generation Intel Core Processors
Software vendor:
Intel
Intel
Description
The vulnerability allows a local user to escalate privileges on the system
The vulnerability exists due to improper access restrictions in the BIOS authenticated code module. A local user can obtain elevated privileges on the system.
Remediation
Install updates from vendor's website.