CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
Unauthorized error injection in Intelยฎ SGX or Intelยฎ TDX for some Intelยฎ Xeonยฎ Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[
{
"vendor": "n/a",
"product": "Intel(R) Xeon(R) Processors",
"versions": [
{
"version": "See references",
"status": "affected"
}
],
"defaultStatus": "unaffected"
}
]
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html
lists.debian.org/debian-lts-announce/2023/08/msg00026.html
lists.fedoraproject.org/archives/list/[email protected]/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
lists.fedoraproject.org/archives/list/[email protected]/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
security.netapp.com/advisory/ntap-20230915-0003/
www.debian.org/security/2023/dsa-5474
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%