Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28389: escalation of privilege in Intel(R) CSME installer software

0
Medium
VulnerabilityCVE-2023-28389cvecve-2023-28389
Published: Thu Mar 14 2024 (03/14/2024, 16:45:48 UTC)
Source: CVE Database V5
Product: Intel(R) CSME installer software

Description

Incorrect default permissions in some Intel(R) CSME installer software before version 2328.5.5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 11/04/2025, 16:50:10 UTC

Technical Analysis

CVE-2023-28389 is a vulnerability identified in Intel(R) Converged Security and Management Engine (CSME) installer software prior to version 2328.5.5.0. The root cause is incorrect default permissions set on components of the installer software, which can be exploited by an authenticated local user to escalate their privileges on the affected system. The vulnerability requires local access and user interaction, with the attacker needing at least low-level privileges initially. Once exploited, it can lead to a full compromise of confidentiality, integrity, and availability of the system, as indicated by the CVSS vector (C:H/I:H/A:H). The attack complexity is high, meaning exploitation is not trivial, and no known exploits have been reported in the wild to date. Intel CSME is a critical component embedded in many Intel platforms, responsible for security and management functions at a low level, making this vulnerability particularly sensitive. The vulnerability was published on March 14, 2024, and affects all versions before 2328.5.5.0. The CVSS score of 6.7 reflects a medium severity level, balancing the high impact with the complexity and requirement for local authenticated access. The vulnerability highlights the importance of correct permission settings in security-critical installer software to prevent privilege escalation attacks.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Intel hardware with the affected CSME installer software versions. Successful exploitation could allow an attacker with local access to escalate privileges, potentially leading to full system compromise. This can affect confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by enabling disruptive actions. Sectors with high reliance on Intel-based infrastructure, such as finance, government, telecommunications, and critical infrastructure, could face significant operational and reputational damage. The requirement for local access and user interaction limits remote exploitation but insider threats or malware with local execution capabilities could leverage this vulnerability. Unpatched systems in corporate environments, especially those with shared or multi-user access, are at higher risk. The absence of known exploits in the wild currently reduces immediate threat levels but does not eliminate future risk, emphasizing the need for proactive patching and monitoring.

Mitigation Recommendations

1. Immediately update Intel CSME installer software to version 2328.5.5.0 or later, where the permission issues are corrected. 2. Conduct an audit of local user permissions and access controls on systems with Intel hardware to ensure no excessive privileges are granted unnecessarily. 3. Implement strict local access controls and monitor for unusual privilege escalation attempts or unauthorized user activities. 4. Employ endpoint detection and response (EDR) tools to detect suspicious behavior indicative of privilege escalation. 5. Educate users about the risks of local privilege escalation and enforce least privilege principles to minimize the impact of compromised accounts. 6. Regularly review and harden system configurations, especially on multi-user systems or shared environments. 7. Maintain up-to-date inventories of affected hardware and software versions to prioritize patching efforts. 8. Consider network segmentation to limit the spread of potential local exploits within the organization.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2023-05-11T03:00:02.698Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2ddcf0ba78a050535ab0

Added to database: 11/4/2025, 4:46:20 PM

Last enriched: 11/4/2025, 4:50:10 PM

Last updated: 11/5/2025, 2:05:23 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats