Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-25546: denial of service in UEFI firmware for some Intel(R) Processors

0
Low
VulnerabilityCVE-2023-25546cvecve-2023-25546
Published: Mon Sep 16 2024 (09/16/2024, 16:38:46 UTC)
Source: CVE Database V5
Product: UEFI firmware for some Intel(R) Processors

Description

Out-of-bounds read in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.

AI-Powered Analysis

AILast updated: 11/04/2025, 00:11:17 UTC

Technical Analysis

CVE-2023-25546 is a vulnerability identified in the UEFI firmware of certain Intel processors, characterized by an out-of-bounds read condition. This flaw allows a privileged local user—such as an administrator or someone with elevated system rights—to potentially trigger a denial of service (DoS) condition on affected systems. The vulnerability arises from improper bounds checking within the UEFI firmware code, which can lead to reading memory outside the intended buffer. While this does not directly compromise confidentiality or integrity, it can cause system instability or crashes, effectively denying service to legitimate users. The vulnerability requires local access with high privileges, no user interaction, and is difficult to exploit remotely. The CVSS 4.0 base score is 1.8, reflecting low severity due to the limited scope and impact. No known exploits have been reported in the wild, and no patches are currently linked, indicating that mitigation depends on vendor firmware updates. The affected versions are not explicitly listed but pertain to some Intel processors' UEFI firmware implementations. The vulnerability is primarily a concern for environments where privileged local access is possible, such as enterprise or data center systems.

Potential Impact

For European organizations, the primary impact of CVE-2023-25546 is potential system downtime or instability caused by denial of service on affected Intel-based systems. This could disrupt critical business operations, especially in sectors relying heavily on Intel hardware with vulnerable UEFI firmware, such as finance, manufacturing, and government. Although the vulnerability does not allow data theft or system takeover, the ability for a privileged user to cause system crashes could be leveraged in insider threat scenarios or combined with other attacks to increase disruption. The low severity and requirement for high privileges limit the risk to organizations with strong access controls. However, environments with shared administrative access or insufficient privilege separation may be more vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the need for vigilance and patching once updates become available.

Mitigation Recommendations

1. Monitor Intel and hardware vendor advisories closely for firmware updates addressing CVE-2023-25546 and apply patches promptly once released. 2. Restrict privileged local access strictly to trusted personnel and enforce the principle of least privilege to minimize the risk of exploitation. 3. Implement robust logging and monitoring of privileged user activities to detect any anomalous behavior that could indicate exploitation attempts. 4. Use hardware and firmware inventory tools to identify systems with affected Intel processors and UEFI firmware versions to prioritize patching. 5. Consider network segmentation and endpoint protection measures to limit the impact of potential local attacks. 6. Educate system administrators about the risks of local privilege misuse and the importance of firmware updates. 7. If firmware updates are delayed, consider temporary operational controls such as limiting physical and remote administrative access to critical systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2023-02-17T04:00:04.646Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6909262bfe7723195e0b5e0e

Added to database: 11/3/2025, 10:01:15 PM

Last enriched: 11/4/2025, 12:11:17 AM

Last updated: 11/5/2025, 2:05:32 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats