Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
History

Thu, 14 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Intel
Intel 3rd Generation Intel Xeon Scalable Processor Family
Intel 4th Generation Intel Xeon Processor Scalable Family
Intel 5th Generation Intel Xeon Processor Scalable Family
Intel xeon D Processor
CPEs cpe:2.3:h:intel:3rd_generation_intel_xeon_scalable_processor_family:606a6:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_generation_intel_xeon_processor_scalable_family:806f7:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_generation_intel_xeon_processor_scalable_family:806f8:*:*:*:*:*:*:*
cpe:2.3:h:intel:5th_generation_intel_xeon_processor_scalable_family:c06f2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_d_processor:606c1:*:*:*:*:*:*:*
Vendors & Products Intel
Intel 3rd Generation Intel Xeon Scalable Processor Family
Intel 4th Generation Intel Xeon Processor Scalable Family
Intel 5th Generation Intel Xeon Processor Scalable Family
Intel xeon D Processor
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 20:45:00 +0000

Type Values Removed Values Added
Description Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
Weaknesses CWE-92
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published: 2024-11-13T20:34:16.216Z

Updated: 2024-11-14T19:50:21.922Z

Reserved: 2024-02-08T04:00:11.946Z

Link: CVE-2024-23918

cve-icon Vulnrichment

Updated: 2024-11-14T18:42:35.724Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-13T21:15:11.227

Modified: 2024-11-15T14:00:09.720

Link: CVE-2024-23918

cve-icon Redhat

No data.