Show plain JSON{"affected_release": [{"advisory": "RHBA-2025:2428", "cpe": "cpe:/o:redhat:rhel_aus:7.7", "package": "microcode_ctl-2:2.1-53.25.el7_7.1", "product_name": "Red Hat Enterprise Linux 7.7 Advanced Update Support", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2427", "cpe": "cpe:/o:redhat:rhel_els:7", "package": "microcode_ctl-2:2.1-73.23.el7_9", "product_name": "Red Hat Enterprise Linux 7 Extended Lifecycle Support", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2424", "cpe": "cpe:/o:redhat:rhel_aus:8.2", "package": "microcode_ctl-4:20191115-4.20250211.1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2423", "cpe": "cpe:/o:redhat:rhel_aus:8.4", "package": "microcode_ctl-4:20210216-1.20250211.1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2423", "cpe": "cpe:/o:redhat:rhel_tus:8.4", "package": "microcode_ctl-4:20210216-1.20250211.1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2423", "cpe": "cpe:/o:redhat:rhel_e4s:8.4", "package": "microcode_ctl-4:20210216-1.20250211.1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2422", "cpe": "cpe:/o:redhat:rhel_aus:8.6", "package": "microcode_ctl-4:20220207-1.20250211.1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2422", "cpe": "cpe:/o:redhat:rhel_tus:8.6", "package": "microcode_ctl-4:20220207-1.20250211.1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2422", "cpe": "cpe:/o:redhat:rhel_e4s:8.6", "package": "microcode_ctl-4:20220207-1.20250211.1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2421", "cpe": "cpe:/o:redhat:rhel_eus:8.8", "package": "microcode_ctl-4:20220809-2.20250211.1.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHBA-2025:2991", "cpe": "cpe:/o:redhat:enterprise_linux:9", "package": "microcode_ctl-4:20240910-1.20250211.1.el9_5", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2025-03-18T00:00:00Z"}, {"advisory": "RHEA-2025:2419", "cpe": "cpe:/o:redhat:rhel_e4s:9.0", "package": "microcode_ctl-4:20220207-1.20250211.1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2420", "cpe": "cpe:/o:redhat:rhel_eus:9.2", "package": "microcode_ctl-4:20220809-2.20250211.1.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2025-03-06T00:00:00Z"}, {"advisory": "RHEA-2025:2418", "cpe": "cpe:/o:redhat:rhel_eus:9.4", "package": "microcode_ctl-4:20230808-2.20250211.1.el9_4", "product_name": "Red Hat Enterprise Linux 9.4 Extended Update Support", "release_date": "2025-03-06T00:00:00Z"}], "bugzilla": {"description": "microcode_ctl: Improper input validation in UEFI firmware", "id": "2345401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345401"}, "csaw": false, "cvss3": {"cvss3_base_score": "7.5", "cvss3_scoring_vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-20", "details": ["Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.", "An improper input validation flaw was found in UEFI firmware. Some Intel(R) processors may allow a privileged user to enable privilege escalation via local access."], "name": "CVE-2023-34440", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Affected", "package_name": "microcode_ctl", "product_name": "Red Hat Enterprise Linux 8"}], "public_date": "2025-02-12T21:19:25Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-34440\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-34440\nhttps://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"], "statement": "Red Hat has given this vulnerability the impact rating of Important due to the potential of escalating privileges locally.", "threat_severity": "Important"}