Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-22655
HistoryMar 12, 2024 - 12:00 a.m.

CVE-2023-22655

2024-03-1200:00:00
ubuntu.com
ubuntu.com
13
cve-2023-22655; protection mechanism failure; intel xeon processors; sgx; tdx; privilege escalation; local access

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N

0.001 Low

EPSS

Percentile

47.8%

Protection mechanism failure in some 3rd and 4th Generation Intel®
Xeon® Processors when using Intel® SGX or Intel® TDX may allow a
privileged user to potentially enable escalation of privilege via local
access.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchintel-microcode< 3.20240514.0ubuntu0.18.04.1+esm1UNKNOWN
ubuntu20.04noarchintel-microcode< 3.20240514.0ubuntu0.20.04.1UNKNOWN
ubuntu22.04noarchintel-microcode< 3.20240514.0ubuntu0.22.04.1UNKNOWN
ubuntu23.10noarchintel-microcode< 3.20240514.0ubuntu0.23.10.1UNKNOWN
ubuntu16.04noarchintel-microcode< 3.20240514.0ubuntu0.16.04.1+esm1UNKNOWN

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N

0.001 Low

EPSS

Percentile

47.8%