Attacker Value
Unknown
0
CVE-2023-45075
0
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-45075
(Last updated November 17, 2023) ▾
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
A memory leakage vulnerability was reported in the SWSMI_Shadow DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
6.7 Medium
Impact Score:
5.9
Exploitability Score:
0.8
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
High
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
BIOS various
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
Products
- ideacentre 3 07ada05 firmware
- ideacentre 3 07imb05 firmware
- ideacentre 5 14iob6 firmware
- ideacentre c5 14imb05 firmware
- ideacentre creator 5 14iob6 firmware
- ideacentre g5 14amr05 firmware
- ideacentre g5 14imb05 firmware
- ideacentre gaming 5 14iob6 firmware
- ideacentre mini 5 01iaq7 firmware
- ideacentre mini 5 01imh05 firmware
- legion t7 34imz5 firmware
- thinkcentre m625q firmware
- thinkcentre m630e firmware
- thinkcentre m70a firmware
- thinkcentre m70c firmware
- thinkcentre m70q firmware
- thinkcentre m70s firmware
- thinkcentre m70t firmware
- thinkcentre m720q firmware
- thinkcentre m720s firmware
- thinkcentre m720t firmware
- thinkcentre m75n firmware
- thinkcentre m75q gen 2 firmware
- thinkcentre m75s gen 2 firmware
- thinkcentre m75t gen 2 firmware
- thinkcentre m80q firmware
- thinkcentre m80s firmware
- thinkcentre m80t firmware
- thinkcentre m820z all in one firmware
- thinkcentre m90a firmware
- thinkcentre m90q tiny firmware
- thinkcentre m90s firmware
- thinkcentre m90t firmware
- thinkcentre m920q firmware
- thinkcentre m920s firmware
- thinkcentre m920t firmware
- thinkcentre m920x firmware
- thinkcentre m920z all in one firmware
- thinkedge se30 firmware
- thinkstation p320 workstation firmware
- thinkstation p330 tiny workstation firmware
- thinkstation p330 workstation 2nd gen firmware
- thinkstation p330 workstation firmware
- thinkstation p340 tiny workstation firmware
- thinkstation p340 workstation firmware
- thinkstation p348 workstation firmware
- thinkstation p350 workstation firmware
- thinkstation p360 workstation firmware
- thinkstation p360 workstation firmware
- thinkstation p520 workstation firmware
- thinkstation p520c workstation firmware
- thinkstation p720 workstation firmware
- thinkstation p920 workstation firmware
- v30a 22iml firmware
- v30a 24iml firmware
- v50a 22imb firmware
- v50a 24imb firmware
- v50s 07imb firmware
- v50t 13imb firmware
- v50t 13imh firmware
- v50t 13iob g2 firmware
- v55t gen 2 13acn firmware
References
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: