5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
18.0%
Incomplete cleanup from specific special register read operations in some
Intel® Processors may allow an authenticated user to potentially enable
information disclosure via local access.
Author | Note |
---|---|
tyhicks | This issue only affects Intel client and Xeon E3 processors |
sbeattie | also known as “CrossTalk” |
sbeattie | Affected processor families: ============= ============ ======== common name Family_Model Stepping ============= ============ ======== IvyBridge 06_3AH All Haswell 06_3CH All Haswell_L 06_45H All Haswell_G 06_46H All Broadwell_G 06_47H All Broadwell 06_3DH All Skylake_L 06_4EH All Skylake 06_5EH All Kabylake_L 06_8EH <= 0xC Kabylake 06_9EH <= 0xD ============= ============ ======== |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | intel-microcode | < 3.20200609.0ubuntu0.18.04.0 | UNKNOWN |
ubuntu | 19.10 | noarch | intel-microcode | < 3.20200609.0ubuntu0.19.10.0 | UNKNOWN |
ubuntu | 20.04 | noarch | intel-microcode | < 3.20200609.0ubuntu0.20.04.0 | UNKNOWN |
ubuntu | 20.10 | noarch | intel-microcode | < 3.20200609.0ubuntu0.20.04.0 | UNKNOWN |
ubuntu | 14.04 | noarch | intel-microcode | < 3.20200609.0ubuntu0.14.04.0) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | intel-microcode | < 3.20200609.0ubuntu0.16.04.0 | UNKNOWN |
ubuntu | 18.04 | noarch | xen | < any | UNKNOWN |
ubuntu | 20.04 | noarch | xen | < 4.11.3+24-g14b62ab3e5-1ubuntu2.3 | UNKNOWN |
ubuntu | 16.04 | noarch | xen | < any | UNKNOWN |
launchpad.net/bugs/cve/CVE-2020-0543
nvd.nist.gov/vuln/detail/CVE-2020-0543
security-tracker.debian.org/tracker/CVE-2020-0543
software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling
software.intel.com/security-software-guidance/insights/processors-affected-special-register-buffer-data-sampling
software.intel.com/security-software-guidance/software-guidance/special-register-buffer-data-sampling
ubuntu.com/security/notices/USN-4385-1
ubuntu.com/security/notices/USN-4387-1
ubuntu.com/security/notices/USN-4388-1
ubuntu.com/security/notices/USN-4389-1
ubuntu.com/security/notices/USN-4390-1
ubuntu.com/security/notices/USN-4391-1
ubuntu.com/security/notices/USN-4392-1
ubuntu.com/security/notices/USN-4393-1
ubuntu.com/security/notices/USN-5617-1
www.cve.org/CVERecord?id=CVE-2020-0543
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html
www.kernel.org/doc/html/latest/admin-guide/hw-vuln/special-register-buffer-data-sampling.html
www.vusec.net/projects/crosstalk
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
18.0%