5.3
CVE-2023-32280
- EPSS 0.18%
- Veröffentlicht 14.02.2024 14:15:50
- Zuletzt bearbeitet 14.01.2026 18:26:21
- Quelle secure@intel.com
- CVE-Watchlists
- Unerledigt
Insufficiently protected credentials in some Intel(R) Server Product OpenBMC firmware before versions egs-1.05 may allow an unauthenticated user to enable information disclosure via network access.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Intel ≫ Openbmc Version < egs-1.05
Intel ≫ Xeon Bronze 3408u Version-
Intel ≫ Xeon Gold 5403n Version-
Intel ≫ Xeon Gold 5411n Version-
Intel ≫ Xeon Gold 5412u Version-
Intel ≫ Xeon Gold 5416s Version-
Intel ≫ Xeon Gold 5418n Version-
Intel ≫ Xeon Gold 5418y Version-
Intel ≫ Xeon Gold 5423n Version-
Intel ≫ Xeon Gold 5433n Version-
Intel ≫ Xeon Gold 6403n Version-
Intel ≫ Xeon Gold 6414u Version-
Intel ≫ Xeon Gold 6416h Version-
Intel ≫ Xeon Gold 6418h Version-
Intel ≫ Xeon Gold 6421n Version-
Intel ≫ Xeon Gold 6423n Version-
Intel ≫ Xeon Gold 6426y Version-
Intel ≫ Xeon Gold 6428n Version-
Intel ≫ Xeon Gold 6430 Version-
Intel ≫ Xeon Gold 6433n Version-
Intel ≫ Xeon Gold 6433ne Version-
Intel ≫ Xeon Gold 6434 Version-
Intel ≫ Xeon Gold 6434h Version-
Intel ≫ Xeon Gold 6438m Version-
Intel ≫ Xeon Gold 6438n Version-
Intel ≫ Xeon Gold 6442y Version-
Intel ≫ Xeon Gold 6443n Version-
Intel ≫ Xeon Gold 6444y Version-
Intel ≫ Xeon Gold 6448h Version-
Intel ≫ Xeon Gold 6448y Version-
Intel ≫ Xeon Gold 6454s Version-
Intel ≫ Xeon Gold 6458q Version-
Intel ≫ Xeon Platinum 8444h Version-
Intel ≫ Xeon Platinum 8450h Version-
Intel ≫ Xeon Platinum 8452y Version-
Intel ≫ Xeon Platinum 8454h Version-
Intel ≫ Xeon Platinum 8458p Version-
Intel ≫ Xeon Platinum 8460h Version-
Intel ≫ Xeon Platinum 8461v Version-
Intel ≫ Xeon Platinum 8468 Version-
Intel ≫ Xeon Platinum 8468h Version-
Intel ≫ Xeon Platinum 8468v Version-
Intel ≫ Xeon Platinum 8470 Version-
Intel ≫ Xeon Platinum 8470n Version-
Intel ≫ Xeon Platinum 8471n Version-
Intel ≫ Xeon Platinum 8490h Version-
Intel ≫ Xeon Silver 4410t Version-
Intel ≫ Xeon Silver 4410y Version-
Intel ≫ Xeon Gold 5403n Version-
Intel ≫ Xeon Gold 5411n Version-
Intel ≫ Xeon Gold 5412u Version-
Intel ≫ Xeon Gold 5416s Version-
Intel ≫ Xeon Gold 5418n Version-
Intel ≫ Xeon Gold 5418y Version-
Intel ≫ Xeon Gold 5423n Version-
Intel ≫ Xeon Gold 5433n Version-
Intel ≫ Xeon Gold 6403n Version-
Intel ≫ Xeon Gold 6414u Version-
Intel ≫ Xeon Gold 6416h Version-
Intel ≫ Xeon Gold 6418h Version-
Intel ≫ Xeon Gold 6421n Version-
Intel ≫ Xeon Gold 6423n Version-
Intel ≫ Xeon Gold 6426y Version-
Intel ≫ Xeon Gold 6428n Version-
Intel ≫ Xeon Gold 6430 Version-
Intel ≫ Xeon Gold 6433n Version-
Intel ≫ Xeon Gold 6433ne Version-
Intel ≫ Xeon Gold 6434 Version-
Intel ≫ Xeon Gold 6434h Version-
Intel ≫ Xeon Gold 6438m Version-
Intel ≫ Xeon Gold 6438n Version-
Intel ≫ Xeon Gold 6442y Version-
Intel ≫ Xeon Gold 6443n Version-
Intel ≫ Xeon Gold 6444y Version-
Intel ≫ Xeon Gold 6448h Version-
Intel ≫ Xeon Gold 6448y Version-
Intel ≫ Xeon Gold 6454s Version-
Intel ≫ Xeon Gold 6458q Version-
Intel ≫ Xeon Platinum 8444h Version-
Intel ≫ Xeon Platinum 8450h Version-
Intel ≫ Xeon Platinum 8452y Version-
Intel ≫ Xeon Platinum 8454h Version-
Intel ≫ Xeon Platinum 8458p Version-
Intel ≫ Xeon Platinum 8460h Version-
Intel ≫ Xeon Platinum 8461v Version-
Intel ≫ Xeon Platinum 8468 Version-
Intel ≫ Xeon Platinum 8468h Version-
Intel ≫ Xeon Platinum 8468v Version-
Intel ≫ Xeon Platinum 8470 Version-
Intel ≫ Xeon Platinum 8470n Version-
Intel ≫ Xeon Platinum 8471n Version-
Intel ≫ Xeon Platinum 8490h Version-
Intel ≫ Xeon Silver 4410t Version-
Intel ≫ Xeon Silver 4410y Version-
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.18% | 0.4 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secure@intel.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.