Vulnerability Snapshot
CVE-2017-5691 is rated CRITICAL โ exploitation is trivial or already observed in the wild and impact is severe. Patch immediately, not on the next maintenance window.
Affected technology: nuc7i3bnk_bios, nuc7i3bnk, nuc7i5bnk_bios, nuc7i5bnk, nuc7i7bnh_bios, plus 5 other product variants.
Executive Summary
Incorrect check in Intel processors from 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Product Families, and Intel Xeon E3-1200 v5 and v6 Product Families allows compromised system firmware to impact SGX security via incorrect early system state.
Why It Matters
CVE-2017-5691 is rated CRITICAL severity, requiring immediate attention from security teams.
CVSS Base Score: 9/10
Affected Technologies
Vendors: intel
Products: nuc7i3bnk_bios, nuc7i3bnk, nuc7i5bnk_bios, nuc7i5bnk, nuc7i7bnh_bios, nuc7i7bnh, stk2mv64cc_bios, stk2mv64cc, stk2m3w64cc_bios, stk2m3w64cc, nuc6i7kyk_bios, nuc6i7kyk, nuc6i3syk_bios, nuc6i3syk, nuc6i5syk_bios, nuc6i5syk, r1304sposhor_bios, r1304sposhor, r1304sposhorr_bios, r1304sposhorr, r1208sposhorr_bios, r1208sposhorr, lr1304spcfg1r_bios, lr1304spcfg1r, r1208sposhor_bios, r1208sposhor, s1200spsr_bios, s1200spsr, s1200spor_bios, s1200spor, lr1304spcfg1_bios, lr1304spcfg1, s1200spl_bios, s1200spl, s1200spo_bios, s1200spo, s1200sps_bios, s1200sps, r1304sposhbn_bios, r1304sposhbn, s1200splr_bios, s1200splr, r1304sposhbnr_bios, r1304sposhbnr
๐ก๏ธWhat Defenders Should Check
Use Vulnios to continuously monitor your exposure to CVE-2017-5691 and similar vulnerabilities.
References & Sources
How Vulnios Detects This
Vulnios scans for this vulnerability using Trivy and Grype for SBOM-based CVE matching and Vulnios CVE feed continuous monitoring against your asset inventory. Run a scan against your environment to see whether you are exposed; findings are linked back to the original CVE record so triage starts with the patch path already known.
AI Security Advisor
Powered by Gemini
Get AI-powered security recommendations tailored to this specific threat โ including risk assessment, detection guidance, MITRE ATT&CK mapping, and actionable remediation steps.
Affected Products
Sources
Related Threat Alerts
Frequently Asked Questions
What is CVE-2017-5691?
CVE-2017-5691 is a critical-severity vulnerability tracked under the Common Vulnerabilities and Exposures program. Incorrect check in Intel processors from 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Product Families, and Intel Xeon E3-1200 v5 and v6 Product Families allows
Am I affected?
Check whether your environment runs nuc7i3bnk_bios, nuc7i3bnk, nuc7i5bnk_bios, nuc7i5bnk, nuc7i7bnh_bios. If you operate any of those, treat yourself as in scope until you have evidence otherwise. A Vulnios scan will identify the exact assets carrying the affected version.
How urgent is the response?
Critical: do not wait for your normal patch cycle. Verify exposure today, apply the vendor patch immediately, and add detection rules for any post-exploit indicators.
How do I remediate?
Apply the vendor patch listed in the upstream advisory linked under Sources. If the patch is not yet available, follow the vendor-supplied workaround (often a config flag or feature disable) and add detections for the published exploit pattern in your SIEM. Re-scan after the patch lands to confirm the finding clears.
Where can I track exploitation activity?
Watch CISA's Known Exploited Vulnerabilities catalog for CVE-2017-5691. Cross-reference with public exploit databases and your own SIEM/IDS for indicator-of-compromise patterns. Vulnios tracks KEV status automatically and surfaces it on the asset findings view.
How does Vulnios help with this?
Vulnios continuously cross-references your asset inventory against the live CVE feed (NVD, vendor advisories, CISA KEV, and curated OSINT). When a new CVE matches your environment, you get a prioritized finding with the severity, KEV status, exploit-prediction (EPSS), and a direct path to the vendor patch. You can start a free scan from the homepage.
Protect Your Organization
Monitor CVEs, scan for vulnerabilities, and get real-time threat alerts โ all in one platform.
Get instant alerts on Telegram
Join our public channel for real-time critical CVE alerts.
Follow @vulnios