{"id":8062,"date":"2018-12-15T16:37:55","date_gmt":"2018-12-15T15:37:55","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=8062"},"modified":"2023-08-25T22:43:42","modified_gmt":"2023-08-25T20:43:42","slug":"intel-nuc-bios-vulnerability-cve-2018-12176","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/12\/15\/intel-nuc-bios-vulnerability-cve-2018-12176\/","title":{"rendered":"Intel NUC BIOS vulnerability CVE-2018-12176"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>There is a vulnerability (CVE-2018-12176) in the BIOS of various Intel NUCs, which can be used to manipulate the devices. Intel has published a Security Advisory.<\/p>\n<p><!--more--><\/p>\n<p>An improper input validation in the firmware for Intel NUC kits (CVE-2018-12176) allows attackers to patch the BIOS\/UEFI with unsigned updates and place arbitrary code. Embdi security researchers have developed a proof of concept to manipulate the BIOS\/UEFI on various Intel NUCs (details are <a href=\"https:\/\/web.archive.org\/web\/20190531082049\/https:\/\/embedi.org\/blog\/nuclear-explotion\/\" target=\"_blank\" rel=\"noopener noreferrer\">described here<\/a>). The following screenshot shows a BIOS\/UEFI message on the monitor manipulated by Embedi as part of a proof of concept.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"Manipulierte BIOS-Meldung\" src=\"https:\/\/web.archive.org\/web\/20181217231452\/https:\/\/embedi.org\/wp-content\/uploads\/2018\/12\/bios-startup-logo.png\" alt=\"Manipulierte BIOS-Meldung\" width=\"629\" height=\"375\" \/><br \/>\n(Source: Embedi)<\/p>\n<p>Embedi security researchers write that you need to have access to the Intel NUC and administrative privileges for an attack. This restricts the possibility of abuse (no hacking via the Internet). But it opens up new approaches for manipulating hardware. If the attacker succeeds in gaining direct access to the devices, he could place a Trojan in the BIOS\/UEFI which would also survive a new installation of the operating system.<\/p>\n<p>Intel now warns in the <a href=\"https:\/\/web.archive.org\/web\/20230524124415\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00176.html\" target=\"_blank\" rel=\"noopener noreferrer\">Security Advisory INTEL-SA-00176<\/a> of the vulnerability in the following NUC systems:<\/p>\n<ul>\n<li>Intel\u00ae NUC Kit NUC7CJYH<\/li>\n<li>Intel\u00ae NUC Kit NUC8i7HNK<\/li>\n<li>Intel\u00ae Compute Card CD1M3128MK<\/li>\n<li>Intel\u00ae Compute Card CD1IV128MK<\/li>\n<li>Intel\u00ae Compute Card CD1P64GK<\/li>\n<li>Intel\u00ae NUC Kit NUC7i7DNKE<\/li>\n<li>Intel\u00ae NUC Kit NUC7i5DNKE<\/li>\n<li>Intel\u00ae NUC Kit NUC7i3DNHE<\/li>\n<li>Intel\u00ae NUC Kit NUC7i7BNH<\/li>\n<li>Intel\u00ae NUC Kit NUC6CAYS<\/li>\n<li>Intel\u00ae NUC Kit DE3815TYBE<\/li>\n<li>Intel\u00ae NUC Kit NUC6i5SYH<\/li>\n<li>Intel\u00ae NUC Kit NUC6i7KYK<\/li>\n<li>Intel\u00ae NUC Kit NUC5PGYH<\/li>\n<li>Intel\u00ae NUC Kit NUC5CPYH<\/li>\n<li>Intel\u00ae NUC Kit NUC5i7RYH<\/li>\n<li>Intel\u00ae NUC Kit NUC5i5MYHE<\/li>\n<li>Intel\u00ae NUC Kit NUC5i3MYHE<\/li>\n<li>Intel\u00ae NUC Kit DE3815TYBE<\/li>\n<li>Intel\u00ae NUC Kit DN2820FYKH<\/li>\n<li>Intel\u00ae NUC Kit D54250WYB<\/li>\n<li>Intel\u00ae NUC Kit D53427RKE<\/li>\n<li>Intel\u00ae NUC Kit D33217GKE<\/li>\n<li>Intel\u00ae Compute Stick STK2mv64CC<\/li>\n<li>Intel\u00ae Compute Stick STK2m3W64CC<\/li>\n<li>Intel\u00ae Compute Stick STK1AW32SC<\/li>\n<li>Intel\u00ae Compute Stick STCK1A32WFC<\/li>\n<\/ul>\n<p>The company has rated the vulnerability as high (8.2 out of 10 possible points) and has released firmware updates for the affected NUCs and Intel Compute Sticks to close the vulnerability. The update and details can be found in the <a href=\"https:\/\/web.archive.org\/web\/20230524124415\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00176.html\" target=\"_blank\" rel=\"noopener noreferrer\">Security Advisory INTEL-SA-00176<\/a>.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2018\/10\/23\/beware-of-bios-update-0373-for-intel-nucs\/\">Beware of BIOS Update 0373 for Intel NUCs<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2017\/06\/08\/how-to-install-windows-7-on-intel-nuc-with-usb-3-0\/\">How to install Windows 7 on Intel NUC with USB 3.0?<\/a><br \/>\nAdobe and Intel Security Update Review October 9, 2018<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a vulnerability (CVE-2018-12176) in the BIOS of various Intel NUCs, which can be used to manipulate the devices. Intel has published a Security Advisory.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[448,580],"tags":[599,69],"class_list":["post-8062","post","type-post","status-publish","format-standard","hentry","category-devices","category-security","tag-intel","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/8062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=8062"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/8062\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=8062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=8062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=8062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}