{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-42772","assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","state":"PUBLISHED","assignerShortName":"intel","dateReserved":"2023-10-25T03:00:09.570Z","datePublished":"2024-09-16T16:38:42.667Z","dateUpdated":"2025-11-03T21:49:35.298Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel","dateUpdated":"2024-09-16T16:38:42.667Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"escalation of privilege"},{"lang":"en","description":"Untrusted pointer dereference","cweId":"CWE-822","type":"CWE"}]}],"affected":[{"vendor":"n/a","product":"UEFI firmware for some Intel(R) reference processors","versions":[{"version":"See references","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Untrusted pointer dereference in UEFI firmware for some Intel(R) reference processors may allow a privileged user to potentially enable escalation of privilege via local access."}],"references":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":8.2,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"cvssV4_0":{"version":"4.0","baseScore":8.7,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH"}}]},"adp":[{"affected":[{"vendor":"intel","product":"xeon_d-2799_firmware","cpes":["cpe:2.3:o:intel:core_i9-10900x_x-series_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:core_i9-10920x_x-series_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:core_i9-10940x_x-series_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1603_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1607_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1620_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1630_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1650_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1660_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1680_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2603_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2609_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2620_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2623_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2630_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2637_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2640_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2643_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2650_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2658_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2660_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2667_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2670_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2679_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2680_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2683_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2689_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2690_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2695_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2697_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2698_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2699_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4610_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4620_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4627_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4640_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4648_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4650_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4660_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4667_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4669_v3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1513n_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1518_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1520_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1521_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1523n_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1527_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1528_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1529_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1531_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1533n_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1537_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1539_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1540_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1541_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1548_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1553n_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1557_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1559_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1567_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1571_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_processor_d-1577_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1581_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1587_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1612_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1632_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-16T20:21:50.697442Z","id":"CVE-2023-42772","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-17T20:56:46.886Z"}},{"title":"CVE Program Container","references":[{"url":"https://security.netapp.com/advisory/ntap-20241011-0009/"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T21:49:35.298Z"}}]}}