CVE-2023-29164
Published: 12 February 2025
Summary
CVE-2023-29164 is a high-severity Improper Access Control (CWE-284) vulnerability in Intel (inferred from references). Its CVSS base score is 7.3 (High).
Operationally, ranked at the 25.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the improper access control flaw by requiring timely firmware updates to the specified fixed versions for affected Intel Server Boards.
Enforces approved authorizations in the BMC firmware to prevent low-privilege authenticated users from escalating privileges via local access.
Applies least privilege to BMC user accounts, limiting the scope and impact of privilege escalation even if access enforcement is flawed.
NVD Description
Improper access control in BMC Firmware for the Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, before version 02.01.0017 and Intel(R) Server Board M50CYP and Intel(R) Server Board D50TNP before version R01.01.0009 may allow an authenticated…
more
user to enable escalation of privilege via local access.
Deeper analysisAI
CVE-2023-29164 is an improper access control vulnerability (CWE-284) affecting the Baseboard Management Controller (BMC) Firmware on specific Intel Server Boards. The impacted products include Intel Server Board S2600WF, S2600ST, and S2600BP versions prior to 02.01.0017, as well as Intel Server Board M50CYP and D50TNP versions prior to R01.01.0009. The vulnerability, published on 2025-02-12, carries a CVSS v3.1 base score of 7.3 (High), with vector AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N.
An attacker with local access and low-privilege authenticated user permissions can exploit this issue with low attack complexity and no user interaction. Exploitation enables privilege escalation, allowing the attacker to gain elevated access on the BMC. This results in low confidentiality impact, high integrity impact, and no availability impact, with the changed scope amplifying the severity.
Intel's security advisory (INTEL-SA-00990), available at https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html, details the vulnerability and mitigation steps, which include updating the affected BMC Firmware to version 02.01.0017 or later for S2600WF, S2600ST, and S2600BP boards, and R01.01.0009 or later for M50CYP and D50TNP boards.
Details
- CWE(s)