CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
35.3%
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.
[
{
"vendor": "n/a",
"product": "Intel(R) Processors",
"versions": [
{
"version": "See references",
"status": "affected"
}
],
"defaultStatus": "unaffected"
}
]
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
access.redhat.com/solutions/7027704
aws.amazon.com/security/security-bulletins/AWS-2023-007/
downfall.page
lists.debian.org/debian-lts-announce/2023/08/msg00013.html
lists.debian.org/debian-lts-announce/2023/08/msg00026.html
lists.fedoraproject.org/archives/list/[email protected]/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
lists.fedoraproject.org/archives/list/[email protected]/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
lists.fedoraproject.org/archives/list/[email protected]/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
lists.fedoraproject.org/archives/list/[email protected]/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
security.netapp.com/advisory/ntap-20230811-0001/
www.debian.org/security/2023/dsa-5474
www.debian.org/security/2023/dsa-5475
xenbits.xen.org/xsa/advisory-435.html
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
35.3%