CVE-2017-5686
Summary
| CVE | CVE-2017-5686 |
|---|---|
| State | PUBLISHED |
| Assigner | intel |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-04-03 21:59:00 UTC |
| Updated | 2025-04-20 01:37:25 UTC |
| Description | The BIOS in Intel NUC systems based on 6th Gen Intel Core processors prior to version SY0059 may allow may allow an attacker with physical access to the system to gain access to personal information. |
Risk And Classification
Primary CVSS: v3.0 3.9 LOW from [email protected]
CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Problem Types: CWE-276 | Information Disclosure
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Primary | 3.9 | LOW | CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
| 2.0 | [email protected] | Primary | 2.1 | AV:L/AC:L/Au:N/C:P/I:N/A:N |
CVSS v3.0 Breakdown
Attack Vector
PhysicalAttack Complexity
LowPrivileges Required
HighUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:L/AC:L/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Intel | Nuc6i3syh Bios | All | All | All | All |
| Hardware | Intel | Nuc6i3syk | - | All | All | All |
| Operating System | Intel | Nuc6i3syk Bios | All | All | All | All |
| Hardware | Intel | Nuc6i5syh | - | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Intel | Intel NUC NUC6i5SYSH/K Intel NUC6i3SYSH/K | affected Before SY0059 | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Intel® Product Security Center | af854a3a-2127-422b-91ae-364da2661108 | security-center.intel.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.