Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| intel | nuc_8_rugged_kit_nuc8cchkr_firmware | chaplcel.0047 | - |
| intel | nuc_board_nuc8cchb_firmware | chaplcel.0047 | - |
| intel | nuc_7_essential_pc_nuc7cjysal_firmware |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
10
Affected Products
2
References
intel / nuc_8_rugged_kit_nuc8cchkr_firmware
| jyglkcpx.86a.0053 |
| - |
| intel | nuc_kit_nuc7cjyh_firmware | jyglkcpx.86a.0053 | - |
| intel | nuc_kit_nuc7pjyh_firmware | jyglkcpx.86a.0053 | - |
| intel | nuc_kit_nuc6cays_firmware | ayaplcel.86a0053 | - |
| intel | nuc_kit_nuc6cayh_firmware | ayaplcel.86a0053 | - |
| intel | nuc_kit_de3815tykhe_firmware | tybyt20h.86a.0024 | - |
| intel | nuc_board_de3815tybe_firmware | tybyt20h.86a.0024 | - |
| intel | compute_stick_stck1a32wfc_firmware | fcbyt10h.86a | - |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact