CVE-2023-34438
📋 TL;DR
A race condition vulnerability in Intel NUC BIOS firmware allows a privileged user with local access to potentially escalate privileges. This affects Intel NUC systems with vulnerable BIOS versions, requiring an attacker to already have some level of system access.
💻 Affected Systems
- Intel NUC systems
📦 What is this software?
Compute Element Stk2mv64cc Firmware by Intel
View all CVEs affecting Compute Element Stk2mv64cc Firmware →
Nuc Enthusiast Nuc7i3bnb Firmware by Intel
Nuc Enthusiast Nuc7i3bnh Firmware by Intel
Nuc Enthusiast Nuc7i3bnhx1 Firmware by Intel
View all CVEs affecting Nuc Enthusiast Nuc7i3bnhx1 Firmware →
Nuc Enthusiast Nuc7i3bnhxf Firmware by Intel
View all CVEs affecting Nuc Enthusiast Nuc7i3bnhxf Firmware →
Nuc Enthusiast Nuc7i3bnk Firmware by Intel
Nuc Enthusiast Nuc7i5bnb Firmware by Intel
Nuc Enthusiast Nuc7i5bnh Firmware by Intel
Nuc Enthusiast Nuc7i5bnhx1 Firmware by Intel
View all CVEs affecting Nuc Enthusiast Nuc7i5bnhx1 Firmware →
Nuc Enthusiast Nuc7i5bnhxf Firmware by Intel
View all CVEs affecting Nuc Enthusiast Nuc7i5bnhxf Firmware →
Nuc Enthusiast Nuc7i5bnk Firmware by Intel
Nuc Enthusiast Nuc7i5bnkp Firmware by Intel
View all CVEs affecting Nuc Enthusiast Nuc7i5bnkp Firmware →
Nuc Enthusiast Nuc7i7bnb Firmware by Intel
Nuc Enthusiast Nuc7i7bnh Firmware by Intel
Nuc Enthusiast Nuc7i7bnhx1 Firmware by Intel
View all CVEs affecting Nuc Enthusiast Nuc7i7bnhx1 Firmware →
Nuc Enthusiast Nuc7i7bnhxg Firmware by Intel
View all CVEs affecting Nuc Enthusiast Nuc7i7bnhxg Firmware →
Nuc Enthusiast Nuc7i7bnkq Firmware by Intel
View all CVEs affecting Nuc Enthusiast Nuc7i7bnkq Firmware →
Nuc Mini Pc Nuc7i3bnhx1 Firmware by Intel
Nuc Mini Pc Nuc7i3bnhxf Firmware by Intel
Nuc Mini Pc Nuc7i5bnhx1 Firmware by Intel
Nuc Mini Pc Nuc7i5bnhxf Firmware by Intel
Nuc Mini Pc Nuc7i7bnhx1 Firmware by Intel
Nuc Mini Pc Nuc7i7bnhxg Firmware by Intel
Nuc Rugged Kit Nuc8cchb Firmware by Intel
Nuc Rugged Kit Nuc8cchbn Firmware by Intel
Nuc Rugged Kit Nuc8cchkr Firmware by Intel
⚠️ Risk & Real-World Impact
Worst Case
Privileged attacker gains full system control, potentially installing persistent malware or accessing sensitive data.
Likely Case
Privileged user escalates to higher privileges within the system, enabling further compromise.
If Mitigated
Attack fails due to proper access controls and patched firmware.
🎯 Exploit Status
Race condition exploitation requires precise timing and privileged access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: BIOS updates specified in Intel SA-00917
Vendor Advisory: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
Restart Required: Yes
Instructions:
1. Identify NUC model and current BIOS version. 2. Download appropriate BIOS update from Intel support site. 3. Follow Intel BIOS update procedures. 4. Reboot system.
🔧 Temporary Workarounds
Restrict local privileged access
allLimit number of users with local administrative privileges
🧯 If You Can't Patch
- Implement strict access controls and least privilege principles
- Monitor for unusual privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check BIOS version against vulnerable versions in Intel SA-00917
Check Version:
Windows: wmic bios get smbiosbiosversion | Linux: dmidecode -s bios-version
Verify Fix Applied:
Verify BIOS version matches patched version from Intel advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual BIOS access attempts
- Privilege escalation patterns
Network Indicators:
- None - local exploit only
SIEM Query:
Search for BIOS update events followed by privilege changes