5.3
MEDIUM CVSS 3.1
CVE-2023-32280
Intel Server Product OpenBMC Firmware Unauthenticated Credentials Disclosure
Description

Insufficiently protected credentials in some Intel(R) Server Product OpenBMC firmware before versions egs-1.05 may allow an unauthenticated user to enable information disclosure via network access.

INFO

Published Date :

Feb. 14, 2024, 2:15 p.m.

Last Modified :

Jan. 14, 2026, 6:26 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2023-32280 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Intel openbmc
2 Intel xeon_gold_6403n
3 Intel xeon_gold_6423n
4 Intel xeon_gold_6433n
5 Intel xeon_gold_6433ne
6 Intel xeon_gold_6443n
7 Intel xeon_platinum_8444h
8 Intel xeon_platinum_8450h
9 Intel xeon_platinum_8452y
10 Intel xeon_platinum_8454h
11 Intel xeon_platinum_8458p
12 Intel xeon_platinum_8460h
13 Intel xeon_platinum_8460y\+
14 Intel xeon_platinum_8461v
15 Intel xeon_platinum_8462y\+
16 Intel xeon_platinum_8468
17 Intel xeon_platinum_8468h
18 Intel xeon_platinum_8468v
19 Intel xeon_platinum_8470
20 Intel xeon_platinum_8470n
21 Intel xeon_platinum_8471n
22 Intel xeon_platinum_8480\+
23 Intel xeon_platinum_8490h
24 Intel xeon_gold_5411n
25 Intel xeon_gold_5412u
26 Intel xeon_gold_5415\+
27 Intel xeon_gold_5416s
28 Intel xeon_gold_5418n
29 Intel xeon_gold_5418y
30 Intel xeon_gold_5420\+
31 Intel xeon_gold_5423n
32 Intel xeon_gold_5433n
33 Intel xeon_gold_6414u
34 Intel xeon_gold_6416h
35 Intel xeon_gold_6418h
36 Intel xeon_gold_6421n
37 Intel xeon_gold_6426y
38 Intel xeon_gold_6428n
39 Intel xeon_gold_6430
40 Intel xeon_gold_6434
41 Intel xeon_gold_6434h
42 Intel xeon_gold_6438m
43 Intel xeon_gold_6438n
44 Intel xeon_gold_6438y\+
45 Intel xeon_gold_6442y
46 Intel xeon_gold_6444y
47 Intel xeon_gold_6448h
48 Intel xeon_gold_6448y
49 Intel xeon_gold_6454s
50 Intel xeon_gold_6458q
51 Intel xeon_silver_4410t
52 Intel xeon_silver_4410y
53 Intel xeon_bronze_3408u
54 Intel xeon_gold_5403n
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-32280.

URL Resource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html Vendor Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-32280 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-32280 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-32280 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 14, 2026

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:o:intel:openbmc:*:*:*:*:*:*:*:* versions up to (excluding) egs-1.05 OR cpe:2.3:h:intel:xeon_platinum_8460y+:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8461v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8462y+:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8468:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8468h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8468v:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8470:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8470n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8471n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8480+:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8490h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_5411n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_5412u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_5415+:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_5416s:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_5418n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_5418y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_5420+:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_5423n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_5433n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6414u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6416h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6403n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6423n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6433n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6433ne:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6443n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8444h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8450h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8452y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8454h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8458p:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6418h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6421n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6426y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6428n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6430:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6434:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_silver_4410y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_bronze_3408u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_platinum_8460h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6434h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6438m:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6438n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6438y+:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6442y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6444y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6448h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6448y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6454s:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_6458q:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_silver_4410t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_gold_5403n:-:*:*:*:*:*:*:*
    Added Reference Type Intel Corporation: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html Types: Vendor Advisory
    Added Reference Type CVE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html Types: Vendor Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Received by [email protected]

    Feb. 14, 2024

    Action Type Old Value New Value
    Added Description Insufficiently protected credentials in some Intel(R) Server Product OpenBMC firmware before versions egs-1.05 may allow an unauthenticated user to enable information disclosure via network access.
    Added Reference Intel Corporation https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html [No types assigned]
    Added CWE Intel Corporation CWE-522
    Added CVSS V3.1 Intel Corporation AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 5.3
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.22 }} 0.07%

score

0.44662

percentile