Vulnerability Description
Path transversal in some Intel(R) NUC Uniwill Service Driver for Intel(R) NUC M15 Laptop Kits - LAPRC510 & LAPRC710 Uniwill Service Driver installation software before version 1.0.1.7 for Intel(R) NUC Software Studio may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intel | Nuc Uniwill Service Driver | < 1.0.1.7 |
| Intel | Nuc M15 Laptop Kit Evo Laprc510 | - |
| Intel | Nuc M15 Laptop Kit Evo Laprc710 | - |
| Intel | Nuc M15 Laptop Kit Laprc510 | - |
| Intel | Nuc M15 Laptop Kit Laprc710 | - |
Related Weaknesses (CWE)
References
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.PatchVendor Advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.PatchVendor Advisory
FAQ
What is CVE-2023-32278?
CVE-2023-32278 is a vulnerability with a CVSS score of 6.7 (MEDIUM). Path transversal in some Intel(R) NUC Uniwill Service Driver for Intel(R) NUC M15 Laptop Kits - LAPRC510 & LAPRC710 Uniwill Service Driver installation software before version 1.0.1.7 for Intel(R) NUC...
How severe is CVE-2023-32278?
CVE-2023-32278 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-32278?
Check the references section above for vendor advisories and patch information. Affected products include: Intel Nuc Uniwill Service Driver, Intel Nuc M15 Laptop Kit Evo Laprc510, Intel Nuc M15 Laptop Kit Evo Laprc710, Intel Nuc M15 Laptop Kit Laprc510, Intel Nuc M15 Laptop Kit Laprc710.