Lucene search

K
vulnrichmentIntelVULNRICHMENT:CVE-2023-22655
HistoryMar 14, 2024 - 4:45 p.m.

CVE-2023-22655

2024-03-1416:45:46
CWE-693
intel
github.com
1
intel xeon processors
sgx
tdx
privilege escalation
local access

CVSS3

6.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N

AI Score

6.9

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Protection mechanism failure in some 3rd and 4th Generation Intel® Xeon® Processors when using Intel® SGX or Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:intel:3rd_gen_intel_xeon_scalable_processor_family:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "3rd_gen_intel_xeon_scalable_processor_family",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:intel:xeon_d_processor:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "xeon_d_processor",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:intel:4th_generation_intel_xeon_platinum_processors:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "4th_generation_intel_xeon_platinum_processors",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:intel:4th_generation_intel_xeon_gold_processors:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "4th_generation_intel_xeon_gold_processors",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:intel:4th_gen_intel_xeon_scalable_processors:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "4th_gen_intel_xeon_scalable_processors",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:intel:4th_gen_intel_xeon_platinum_processors:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "4th_gen_intel_xeon_platinum_processors",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:intel:4th_gen_intel_xeon_gold_processors:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "4th_gen_intel_xeon_gold_processors",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:intel:4th_gen_intel_xeon_silver_processors:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "4th_gen_intel_xeon_silver_processors",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:intel:4th_gen_intel_xeon_bronze_processors:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "4th_gen_intel_xeon_bronze_processors",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:intel:xeon_cpu_max_series_processors:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "xeon_cpu_max_series_processors",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:intel:4th_gen_intel_xeon_scalable_processors_with_intel_vran:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "4th_gen_intel_xeon_scalable_processors_with_intel_vran",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N

AI Score

6.9

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total