Lucene search

K
amazonAmazonALAS-2023-1890
HistoryNov 10, 2023 - 8:56 p.m.

Important: microcode_ctl

2023-11-1020:56:00
alas.aws.amazon.com
13
microcode_ctl
intel xeon
scalable processors
dos
privilege escalation
amazon linux
ec2
security bulletin
cve-2023-23583
red hat
mitre
unix

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.2

Confidence

High

EPSS

0

Percentile

5.1%

Issue Overview:

An issue was found in redundant REX instruction prefix values affecting third generation Intel Xeon Scalable (“Icelake“) processors. The issue may allow a local third-party actor using such instructions to cause a denial of service (DOS) or achieve privilege escalation. CVE-2023-23583 only affects Amazon Linux customers on EC2 metal platforms. Please refer to the AWS Security Bulletin for more information on the affected instance families and the impacts on AWS services: (https://aws.amazon.com/security/security-bulletins/AWS-2023-013). (CVE-2023-23583)

Affected Packages:

microcode_ctl

Issue Correction:
Run yum update microcode_ctl to update your system.

New Packages:

i686:  
    microcode_ctl-debuginfo-2.1-47.42.amzn1.i686  
    microcode_ctl-2.1-47.42.amzn1.i686  
  
src:  
    microcode_ctl-2.1-47.42.amzn1.src  
  
x86_64:  
    microcode_ctl-2.1-47.42.amzn1.x86_64  
    microcode_ctl-debuginfo-2.1-47.42.amzn1.x86_64  

Additional References

Red Hat: CVE-2023-23583

Mitre: CVE-2023-23583

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.2

Confidence

High

EPSS

0

Percentile

5.1%