CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
15.7%
Improper access control in some 3rd Generation Intel® Xeon® Scalable processors may allow a privileged user to potentially enable information disclosure via local access.
Vendor | Product | Version | CPE |
---|---|---|---|
intel | microcode | * | cpe:2.3:o:intel:microcode:*:*:*:*:*:*:*:* |
intel | xeon_d-1513n | - | cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:* |
intel | xeon_d-1518 | - | cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:* |
intel | xeon_d-1520 | - | cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:* |
intel | xeon_d-1521 | - | cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:* |
intel | xeon_d-1523n | - | cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:* |
intel | xeon_d-1527 | - | cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:* |
intel | xeon_d-1528 | - | cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:* |
intel | xeon_d-1529 | - | cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:* |
intel | xeon_d-1531 | - | cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:* |
[
{
"vendor": "n/a",
"product": "3rd Generation Intel(R) Xeon(R) Scalable processors",
"versions": [
{
"version": "See references",
"status": "affected"
}
],
"defaultStatus": "unaffected"
}
]
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html
lists.debian.org/debian-lts-announce/2023/08/msg00026.html
lists.fedoraproject.org/archives/list/[email protected]/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
lists.fedoraproject.org/archives/list/[email protected]/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
security.netapp.com/advisory/ntap-20230824-0003/
www.debian.org/security/2023/dsa-5474