Lucene search

K
cveIntelCVE-2022-21125
HistoryJun 15, 2022 - 8:15 p.m.

CVE-2022-21125

2022-06-1520:15:17
CWE-459
intel
web.nvd.nist.gov
253
14
cve-2022-21125
intel
processors
information disclosure
nvd

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

25.3%

Incomplete cleanup of microarchitectural fill buffers on some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.

Affected configurations

Nvd
Node
xenxenx86
Node
fedoraprojectfedoraMatch35
OR
fedoraprojectfedoraMatch36
Node
intelsgx_dcapRange<1.14.100.3linux
OR
intelsgx_dcapRange<1.14.100.3windows
OR
intelsgx_pswRange<2.16.100.3windows
OR
intelsgx_pswRange<2.17.100.3linux
OR
intelsgx_sdkRange<2.16.100.3windows
OR
intelsgx_sdkRange<2.17.100.3linux
Node
vmwareesxiMatch7.0-
OR
vmwareesxiMatch7.0beta
OR
vmwareesxiMatch7.0update_1
OR
vmwareesxiMatch7.0update_1a
OR
vmwareesxiMatch7.0update_1b
OR
vmwareesxiMatch7.0update_1c
OR
vmwareesxiMatch7.0update_1d
OR
vmwareesxiMatch7.0update_2
OR
vmwareesxiMatch7.0update_2a
OR
vmwareesxiMatch7.0update_2c
OR
vmwareesxiMatch7.0update_2d
OR
vmwareesxiMatch7.0update_3c
OR
vmwareesxiMatch7.0update_3d
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
VendorProductVersionCPE
xenxen*cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*
fedoraprojectfedora35cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
fedoraprojectfedora36cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
intelsgx_dcap*cpe:2.3:a:intel:sgx_dcap:*:*:*:*:*:linux:*:*
intelsgx_dcap*cpe:2.3:a:intel:sgx_dcap:*:*:*:*:*:windows:*:*
intelsgx_psw*cpe:2.3:a:intel:sgx_psw:*:*:*:*:*:windows:*:*
intelsgx_psw*cpe:2.3:a:intel:sgx_psw:*:*:*:*:*:linux:*:*
intelsgx_sdk*cpe:2.3:a:intel:sgx_sdk:*:*:*:*:*:windows:*:*
intelsgx_sdk*cpe:2.3:a:intel:sgx_sdk:*:*:*:*:*:linux:*:*
vmwareesxi7.0cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*
Rows per page:
1-10 of 251

CNA Affected

[
  {
    "product": "Intel(R) Processors",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "See references"
      }
    ]
  }
]

References

Social References

More

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

25.3%