Potential security vulnerabilities in Memory Mapped I/O (MMIO) for some Intel® Processors may allow information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
CVEID: CVE-2022-21123
Description: Incomplete cleanup of multi-core shared buffers for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVSS Base Score: 6.1 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
CVEID: CVE-2022-21125
Description: Incomplete cleanup of microarchitectural fill buffers on some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVSS Base Score: 5.6 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
CVEID: CVE-2022-21127
Description: Incomplete cleanup in specific special register read operations for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVSS Base Score: 5.5 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVEID: CVE-2022-21166
Description: Incomplete cleanup in specific special register write operations for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVSS Base Score: 5.5 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Some Intel® Processors, see full list:
Intel recommends that users of the affected Intel® Processors update to the latest version provided by the system manufacturer that addresses these issues.
Intel® SGX PSW for Windows to version 2.16.100.3 or later:
<https://registrationcenter.intel.com/en/products/download/3406/>
Intel® SGX SDK for Windows to version 2.16.100.3 or later:
<https://registrationcenter.intel.com/en/products/download/3407/>
Intel® SGX DCAP for Windows to version 1.14.100.3 or later:
<https://registrationcenter.intel.com/en/products/download/3610/>
Intel® SGX PSW for Linux to version 2.17.100.3 or later:
<https://01.org/intel-software-guard-extensions/downloads>
Intel® SGX SDK for Linux to version 2.17.100.3 or later:
<https://01.org/intel-software-guard-extensions/downloads>
Intel® SGX DCAP for Linux to version 1.14.100.3 or later:
<https://01.org/intel-software-guard-extensions/downloads>
To address this issue, an Intel SGX TCB Recovery is planned. Details can be found here.
Refer to Intel SGX Attestation Technical Details for more information on the Intel SGX TCB recovery process.
Further TCB Recovery Guidance for developers is available
The following issues were found internally by Intel employees. Intel would like to thank Ke Sun, Alan Miller, Shlomi Alkalay, Robert Jones, Ezra Caltum for reporting CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166. Jason Kilman for reporting CVE-2022-21123, CVE-2022-21127, and Scott Cape and Anthony Wojciechowski for reporting CVE-2022-21127.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.