Improper authentication in some Intel(R) Server Product OpenBMC firmware before version egs-1.09 may allow an authenticated user to enable escalation of privilege via local access.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-35505 Improper authentication in some Intel(R) Server Product OpenBMC firmware before version egs-1.09 may allow an authenticated user to enable escalation of privilege via local access.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 14 Jan 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Intel
Intel openbmc
Intel xeon Bronze 3408u
Intel xeon Gold 5403n
Intel xeon Gold 5411n
Intel xeon Gold 5412u
Intel xeon Gold 5415\+
Intel xeon Gold 5416s
Intel xeon Gold 5418n
Intel xeon Gold 5418y
Intel xeon Gold 5420\+
Intel xeon Gold 5423n
Intel xeon Gold 5433n
Intel xeon Gold 6403n
Intel xeon Gold 6414u
Intel xeon Gold 6416h
Intel xeon Gold 6418h
Intel xeon Gold 6421n
Intel xeon Gold 6423n
Intel xeon Gold 6426y
Intel xeon Gold 6428n
Intel xeon Gold 6430
Intel xeon Gold 6433n
Intel xeon Gold 6433ne
Intel xeon Gold 6434
Intel xeon Gold 6434h
Intel xeon Gold 6438m
Intel xeon Gold 6438n
Intel xeon Gold 6438y\+
Intel xeon Gold 6442y
Intel xeon Gold 6443n
Intel xeon Gold 6444y
Intel xeon Gold 6448h
Intel xeon Gold 6448y
Intel xeon Gold 6454s
Intel xeon Gold 6458q
Intel xeon Platinum 8444h
Intel xeon Platinum 8450h
Intel xeon Platinum 8452y
Intel xeon Platinum 8454h
Intel xeon Platinum 8458p
Intel xeon Platinum 8460h
Intel xeon Platinum 8460y\+
Intel xeon Platinum 8461v
Intel xeon Platinum 8462y\+
Intel xeon Platinum 8468
Intel xeon Platinum 8468h
Intel xeon Platinum 8468v
Intel xeon Platinum 8470
Intel xeon Platinum 8470n
Intel xeon Platinum 8471n
Intel xeon Platinum 8480\+
Intel xeon Platinum 8490h
Intel xeon Silver 4410t
Intel xeon Silver 4410y
CPEs cpe:2.3:h:intel:xeon_bronze_3408u:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5403n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5411n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5412u:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5415\+:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5416s:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5418n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5418y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5420\+:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5423n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_5433n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6403n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6414u:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6416h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6418h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6421n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6423n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6426y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6428n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6430:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6433n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6433ne:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6434:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6434h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6438m:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6438n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6438y\+:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6442y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6443n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6444y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6448h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6448y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6454s:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold_6458q:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8444h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8450h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8452y:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8454h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8458p:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8460h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8460y\+:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8461v:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8462y\+:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8468:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8468h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8468v:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8470:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8470n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8471n:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8480\+:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum_8490h:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4410t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4410y:-:*:*:*:*:*:*:*
cpe:2.3:o:intel:openbmc:*:*:*:*:*:*:*:*
Vendors & Products Intel
Intel openbmc
Intel xeon Bronze 3408u
Intel xeon Gold 5403n
Intel xeon Gold 5411n
Intel xeon Gold 5412u
Intel xeon Gold 5415\+
Intel xeon Gold 5416s
Intel xeon Gold 5418n
Intel xeon Gold 5418y
Intel xeon Gold 5420\+
Intel xeon Gold 5423n
Intel xeon Gold 5433n
Intel xeon Gold 6403n
Intel xeon Gold 6414u
Intel xeon Gold 6416h
Intel xeon Gold 6418h
Intel xeon Gold 6421n
Intel xeon Gold 6423n
Intel xeon Gold 6426y
Intel xeon Gold 6428n
Intel xeon Gold 6430
Intel xeon Gold 6433n
Intel xeon Gold 6433ne
Intel xeon Gold 6434
Intel xeon Gold 6434h
Intel xeon Gold 6438m
Intel xeon Gold 6438n
Intel xeon Gold 6438y\+
Intel xeon Gold 6442y
Intel xeon Gold 6443n
Intel xeon Gold 6444y
Intel xeon Gold 6448h
Intel xeon Gold 6448y
Intel xeon Gold 6454s
Intel xeon Gold 6458q
Intel xeon Platinum 8444h
Intel xeon Platinum 8450h
Intel xeon Platinum 8452y
Intel xeon Platinum 8454h
Intel xeon Platinum 8458p
Intel xeon Platinum 8460h
Intel xeon Platinum 8460y\+
Intel xeon Platinum 8461v
Intel xeon Platinum 8462y\+
Intel xeon Platinum 8468
Intel xeon Platinum 8468h
Intel xeon Platinum 8468v
Intel xeon Platinum 8470
Intel xeon Platinum 8470n
Intel xeon Platinum 8471n
Intel xeon Platinum 8480\+
Intel xeon Platinum 8490h
Intel xeon Silver 4410t
Intel xeon Silver 4410y

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2024-08-14T19:22:35.437Z

Reserved: 2023-06-09T03:00:03.580Z

Link: CVE-2023-31189

cve-icon Vulnrichment

Updated: 2024-08-02T14:45:25.851Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-14T14:15:50.310

Modified: 2026-01-14T18:29:39.013

Link: CVE-2023-31189

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses