Cyber Posture

CVE-2023-29164

HighLPE

Published: 12 February 2025

Published
12 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N
EPSS Score 0.0009 25.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2023-29164 is a high-severity Improper Access Control (CWE-284) vulnerability in Intel (inferred from references). Its CVSS base score is 7.3 (High).

Operationally, ranked at the 25.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the improper access control flaw by requiring timely firmware updates to the specified fixed versions for affected Intel Server Boards.

prevent

Enforces approved authorizations in the BMC firmware to prevent low-privilege authenticated users from escalating privileges via local access.

prevent

Applies least privilege to BMC user accounts, limiting the scope and impact of privilege escalation even if access enforcement is flawed.

NVD Description

Improper access control in BMC Firmware for the Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, before version 02.01.0017 and Intel(R) Server Board M50CYP and Intel(R) Server Board D50TNP before version R01.01.0009 may allow an authenticated…

more

user to enable escalation of privilege via local access.

Deeper analysisAI

CVE-2023-29164 is an improper access control vulnerability (CWE-284) affecting the Baseboard Management Controller (BMC) Firmware on specific Intel Server Boards. The impacted products include Intel Server Board S2600WF, S2600ST, and S2600BP versions prior to 02.01.0017, as well as Intel Server Board M50CYP and D50TNP versions prior to R01.01.0009. The vulnerability, published on 2025-02-12, carries a CVSS v3.1 base score of 7.3 (High), with vector AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N.

An attacker with local access and low-privilege authenticated user permissions can exploit this issue with low attack complexity and no user interaction. Exploitation enables privilege escalation, allowing the attacker to gain elevated access on the BMC. This results in low confidentiality impact, high integrity impact, and no availability impact, with the changed scope amplifying the severity.

Intel's security advisory (INTEL-SA-00990), available at https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html, details the vulnerability and mitigation steps, which include updating the affected BMC Firmware to version 02.01.0017 or later for S2600WF, S2600ST, and S2600BP boards, and R01.01.0009 or later for M50CYP and D50TNP boards.

Details

CWE(s)

Affected Products

Intel
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-25950Shared CWE-284
CVE-2026-5786Shared CWE-284
CVE-2026-32768Shared CWE-284
CVE-2026-33109Shared CWE-284
CVE-2025-24968Shared CWE-284
CVE-2025-54914Shared CWE-284
CVE-2025-1941Shared CWE-284
CVE-2025-1259Shared CWE-284
CVE-2025-66956Shared CWE-284
CVE-2026-32254Shared CWE-284

References