HIGH · 7.8

CVE-2018-3612

Intel NUC kits with insufficient input validation in system firmware, potentially allows a local attacker to elevate privileges to System Management Mode (SMM).

Vulnerability Description

Intel NUC kits with insufficient input validation in system firmware, potentially allows a local attacker to elevate privileges to System Management Mode (SMM).

CVSS Score

7.8

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
IntelBiosayaplcel.86a
IntelAyaplcel.86A-
IntelBnkbl357.86A-
IntelCcsklm30.86A-
IntelCcsklm5V.86A-
IntelDnkbli30.86A-
IntelDnkbli5V.86A-
IntelDnkbli7V.86A-
IntelFybyt10H.86A-
IntelGkaplcpx.86A-
IntelKyskli70.86A-
IntelMkkbli5V.86A-
IntelMkkbly35.86A-
IntelMybdwi30.86A-
IntelMybdwi5V.86A-
IntelRybdwi35.86A-
IntelSyskli35.86A-
IntelTybyt10H.86A-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-3612?

CVE-2018-3612 is a vulnerability with a CVSS score of 7.8 (HIGH). Intel NUC kits with insufficient input validation in system firmware, potentially allows a local attacker to elevate privileges to System Management Mode (SMM).

How severe is CVE-2018-3612?

CVE-2018-3612 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-3612?

Check the references section above for vendor advisories and patch information. Affected products include: Intel Bios, Intel Ayaplcel.86A, Intel Bnkbl357.86A, Intel Ccsklm30.86A, Intel Ccsklm5V.86A.