Lucene search

K
lenovoLenovoLENOVO:PS500327-INTEL-SPECIAL-REGISTER-BUFFER-DATA-SAMPLING-ADVISORY-NOSID
HistoryJun 04, 2020 - 4:44 p.m.

Intel Special Register Buffer Data Sampling Advisory - Lenovo Support NL

2020-06-0416:44:25
support.lenovo.com
20

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

Lenovo Security Advisory: LEN-30043

Potential Impact: Information disclosure

Severity: Medium

Scope of Impact: Industry-wide

CVE Identifier: CVE-2020-0543

Summary Description:

Intel reported potential security vulnerabilities in some Intel Processors that may allow information disclosure. This vulnerability may be referred to as Special Register Buffer Data Sampling (SRBDS) or CrossTalk. Refer to Intel’s Security Advisory for additional information.

Mitigation Strategy for Customers (what you should do to protect yourself):

Intel recommends updating system firmware to the version (or newer) indicated for your model in the Product Impact section below.

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N