CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
Unauthorized error injection in Intel® SGX or Intel® TDX for some Intel® Xeon® Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | 11.0 | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
debian | debian_linux | 12.0 | cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* |
fedoraproject | fedora | 38 | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
intel | xeon_gold_5315y | - | cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:* |
intel | xeon_gold_5315y_firmware | - | cpe:2.3:o:intel:xeon_gold_5315y_firmware:-:*:*:*:*:*:*:* |
intel | xeon_gold_5317 | - | cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:* |
intel | xeon_gold_5317_firmware | - | cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:* |
intel | xeon_gold_5318n | - | cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:* |
intel | xeon_gold_5318n_firmware | - | cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:* |
intel | xeon_gold_5318s | - | cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:* |
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html
lists.debian.org/debian-lts-announce/2023/08/msg00026.html
lists.fedoraproject.org/archives/list/[email protected]/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
lists.fedoraproject.org/archives/list/[email protected]/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
security.netapp.com/advisory/ntap-20230915-0003/
www.debian.org/security/2023/dsa-5474