logo
DATABASE RESOURCES PRICING ABOUT US

Intel® Processors MMIO Stale Data Advisory

Description

### Summary: Potential security vulnerabilities in Memory Mapped I/O (MMIO) for some Intel® Processors may allow information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities. ### Vulnerability Details: CVEID: [CVE-2022-21123](<https://vulners.com/cve/CVE-2022-21123>) Description: Incomplete cleanup of multi-core shared buffers for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access. CVSS Base Score: 6.1 Medium CVSS Vector: [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N](<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N>) CVEID: [CVE-2022-21125](<https://vulners.com/cve/CVE-2022-21125>) Description: Incomplete cleanup of microarchitectural fill buffers on some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access. CVSS Base Score: 5.6 Medium CVSS Vector: [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N](<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N>) CVEID: [CVE-2022-21127](<https://vulners.com/cve/CVE-2022-21127>) Description: Incomplete cleanup in specific special register read operations for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access. CVSS Base Score: 5.5 Medium CVSS Vector: [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N>) CVEID: [CVE-2022-21166](<https://vulners.com/cve/CVE-2022-21166>) Description: Incomplete cleanup in specific special register write operations for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access. CVSS Base Score: 5.5 Medium CVSS Vector: [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N>) ### Affected Products: Some Intel® Processors, see full list: <https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html> ### Recommendations: Intel recommends that users of the affected Intel® Processors update to the latest version provided by the system manufacturer that addresses these issues. Intel® SGX PSW for Windows to version 2.16.100.3 or later: <https://registrationcenter.intel.com/en/products/download/3406/> Intel® SGX SDK for Windows to version 2.16.100.3 or later: <https://registrationcenter.intel.com/en/products/download/3407/> Intel® SGX DCAP for Windows to version 1.14.100.3 or later: <https://registrationcenter.intel.com/en/products/download/3610/> Intel® SGX PSW for Linux to version 2.17.100.3 or later: <https://01.org/intel-software-guard-extensions/downloads> Intel® SGX SDK for Linux to version 2.17.100.3 or later: <https://01.org/intel-software-guard-extensions/downloads> Intel® SGX DCAP for Linux to version 1.14.100.3 or later: <https://01.org/intel-software-guard-extensions/downloads> To address this issue, an Intel SGX TCB Recovery is planned. Details can be found [here](<https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/resources/q4-2022-intel-sgx-tcb-recovery-guidance.html>). Refer to [Intel SGX Attestation Technical Details](<https://www.intel.com/content/www/us/en/security-center/technical-details/sgx-attestation-technical-details.html>) for more information on the Intel SGX TCB recovery process. Further [TCB Recovery Guidance](<https://software.intel.com/content/www/us/en/develop/download/intel-software-guard-extensions-trusted-computing-base-tcb-recovery.html>) for developers is available ### Acknowledgements: The following issues were found internally by Intel employees. Intel would like to thank Ke Sun, Alan Miller, Shlomi Alkalay, Robert Jones, Ezra Caltum for reporting CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166. Jason Kilman for reporting CVE-2022-21123, CVE-2022-21127, and Scott Cape and Anthony Wojciechowski for reporting CVE-2022-21127. Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.


Related