Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Changed
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.00068.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Intel
Subscribe
|
Atom X5-e3930
Subscribe
Atom X5-e3940
Subscribe
Atom X7-e3950
Subscribe
Celeron J1750
Subscribe
Celeron J1800
Subscribe
Celeron J1850
Subscribe
Celeron J1900
Subscribe
Celeron J3060
Subscribe
Celeron J3160
Subscribe
Celeron J3355
Subscribe
Celeron J3355e
Subscribe
Celeron J3455
Subscribe
Celeron J3455e
Subscribe
Celeron J4005
Subscribe
Celeron J4025
Subscribe
Celeron J4105
Subscribe
Celeron J4115
Subscribe
Celeron J4125
Subscribe
Celeron J6412
Subscribe
Celeron J6413
Subscribe
Celeron N2805
Subscribe
Celeron N2806
Subscribe
Celeron N2807
Subscribe
Celeron N2808
Subscribe
Celeron N2810
Subscribe
Celeron N2815
Subscribe
Celeron N2820
Subscribe
Celeron N2830
Subscribe
Celeron N2840
Subscribe
Celeron N2910
Subscribe
Celeron N2920
Subscribe
Celeron N2930
Subscribe
Celeron N2940
Subscribe
Celeron N3000
Subscribe
Celeron N3010
Subscribe
Celeron N3050
Subscribe
Celeron N3060
Subscribe
Celeron N3150
Subscribe
Celeron N3160
Subscribe
Celeron N3350
Subscribe
Celeron N3350e
Subscribe
Celeron N3450
Subscribe
Celeron N4000
Subscribe
Celeron N4000c
Subscribe
Celeron N4020
Subscribe
Celeron N4020c
Subscribe
Celeron N4100
Subscribe
Celeron N4120
Subscribe
Celeron N4500
Subscribe
Celeron N4505
Subscribe
Celeron N5095
Subscribe
Celeron N5100
Subscribe
Celeron N5105
Subscribe
Celeron N6210
Subscribe
Celeron N6211
Subscribe
Core I3-1000g1
Subscribe
Core I3-1000g4
Subscribe
Core I3-1000ng4
Subscribe
Core I3-1005g1
Subscribe
Core I3-10100
Subscribe
Core I3-10100e
Subscribe
Core I3-10100f
Subscribe
Core I3-10100t
Subscribe
Core I3-10100te
Subscribe
Core I3-10100y
Subscribe
Core I3-10105
Subscribe
Core I3-10105f
Subscribe
Core I3-10105t
Subscribe
Core I3-10110u
Subscribe
Core I3-10110y
Subscribe
Core I3-10300
Subscribe
Core I3-10300t
Subscribe
Core I3-10305
Subscribe
Core I3-10305t
Subscribe
Core I3-10320
Subscribe
Core I3-10325
Subscribe
Core I3-11100b
Subscribe
Core I3-1110g4
Subscribe
Core I3-1115g4
Subscribe
Core I3-1115g4e
Subscribe
Core I3-1115gre
Subscribe
Core I3-1120g4
Subscribe
Core I3-1125g4
Subscribe
Core I3-l13g4
Subscribe
Core I5-10200h
Subscribe
Core I5-10210u
Subscribe
Core I5-10210y
Subscribe
Core I5-10300h
Subscribe
Core I5-1030g4
Subscribe
Core I5-1030g7
Subscribe
Core I5-1030ng7
Subscribe
Core I5-10310u
Subscribe
Core I5-10310y
Subscribe
Core I5-1035g1
Subscribe
Core I5-1035g4
Subscribe
Core I5-1035g7
Subscribe
Core I5-1038ng7
Subscribe
Core I5-10400
Subscribe
Core I5-10400f
Subscribe
Core I5-10400h
Subscribe
Core I5-10400t
Subscribe
Core I5-10500
Subscribe
Core I5-10500e
Subscribe
Core I5-10500h
Subscribe
Core I5-10500t
Subscribe
Core I5-10500te
Subscribe
Core I5-10505
Subscribe
Core I5-10600
Subscribe
Core I5-10600k
Subscribe
Core I5-10600kf
Subscribe
Core I5-10600t
Subscribe
Core I5-11260h
Subscribe
Core I5-11300h
Subscribe
Core I5-1130g7
Subscribe
Core I5-11320h
Subscribe
Core I5-1135g7
Subscribe
Core I5-11400
Subscribe
Core I5-11400f
Subscribe
Core I5-11400h
Subscribe
Core I5-11400t
Subscribe
Core I5-1140g7
Subscribe
Core I5-1145g7
Subscribe
Core I5-1145g7e
Subscribe
Core I5-1145gre
Subscribe
Core I5-11500
Subscribe
Core I5-11500b
Subscribe
Core I5-11500h
Subscribe
Core I5-11500t
Subscribe
Core I5-1155g7
Subscribe
Core I5-11600
Subscribe
Core I5-11600k
Subscribe
Core I5-11600kf
Subscribe
Core I5-11600t
Subscribe
Core I5-l16g7
Subscribe
Core I7-10510u
Subscribe
Core I7-10510y
Subscribe
Core I7-1060g7
Subscribe
Core I7-1060ng7
Subscribe
Core I7-10610u
Subscribe
Core I7-1065g7
Subscribe
Core I7-1068ng7
Subscribe
Core I7-10700
Subscribe
Core I7-10700e
Subscribe
Core I7-10700f
Subscribe
Core I7-10700k
Subscribe
Core I7-10700kf
Subscribe
Core I7-10700t
Subscribe
Core I7-10700te
Subscribe
Core I7-10710u
Subscribe
Core I7-10750h
Subscribe
Core I7-10810u
Subscribe
Core I7-10850h
Subscribe
Core I7-10870h
Subscribe
Core I7-10875h
Subscribe
Core I7-11370h
Subscribe
Core I7-11375h
Subscribe
Core I7-11390h
Subscribe
Core I7-1160g7
Subscribe
Core I7-1165g7
Subscribe
Core I7-11700
Subscribe
Core I7-11700b
Subscribe
Core I7-11700f
Subscribe
Core I7-11700k
Subscribe
Core I7-11700kf
Subscribe
Core I7-11700t
Subscribe
Core I7-11800h
Subscribe
Core I7-1180g7
Subscribe
Core I7-11850h
Subscribe
Core I7-1185g7
Subscribe
Core I7-1185g7e
Subscribe
Core I7-1185gre
Subscribe
Core I7-1195g7
Subscribe
Core I9-10850k
Subscribe
Core I9-10885h
Subscribe
Core I9-10900
Subscribe
Core I9-10900e
Subscribe
Core I9-10900f
Subscribe
Core I9-10900k
Subscribe
Core I9-10900kf
Subscribe
Core I9-10900t
Subscribe
Core I9-10900te
Subscribe
Core I9-10910
Subscribe
Core I9-10980hk
Subscribe
Core I9-11900
Subscribe
Core I9-11900f
Subscribe
Core I9-11900h
Subscribe
Core I9-11900k
Subscribe
Core I9-11900kb
Subscribe
Core I9-11900kf
Subscribe
Core I9-11900t
Subscribe
Core I9-11950h
Subscribe
Core I9-11980hk
Subscribe
Pentium J2850
Subscribe
Pentium J2900
Subscribe
Pentium J3710
Subscribe
Pentium J4205
Subscribe
Pentium J6426
Subscribe
Pentium N3510
Subscribe
Pentium N3520
Subscribe
Pentium N3530
Subscribe
Pentium N3540
Subscribe
Pentium N3700
Subscribe
Pentium N3710
Subscribe
Pentium N4200
Subscribe
Pentium N4200e
Subscribe
Pentium N6415
Subscribe
Pentium Silver A1030
Subscribe
Pentium Silver J5005
Subscribe
Pentium Silver J5040
Subscribe
Pentium Silver N5000
Subscribe
Pentium Silver N5030
Subscribe
Pentium Silver N6000
Subscribe
Pentium Silver N6005
Subscribe
|
|
Redhat
Subscribe
|
Configuration 1 [-]
|
Configuration 2 [-]
|
| Package | CPE | Advisory | Released Date |
|---|---|---|---|
| Red Hat Enterprise Linux 6 Extended Lifecycle Support | |||
| microcode_ctl-2:1.17-33.33.el6_10 | cpe:/o:redhat:rhel_els:6 | RHSA-2021:2299 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7 | |||
| microcode_ctl-2:2.1-73.9.el7_9 | cpe:/o:redhat:enterprise_linux:7 | RHSA-2021:2305 | 2021-06-09T00:00:00Z |
| microcode_ctl-2:2.1-73.11.el7_9 | cpe:/o:redhat:enterprise_linux:7 | RHSA-2021:3028 | 2021-08-09T00:00:00Z |
| Red Hat Enterprise Linux 7.2 Advanced Update Support | |||
| microcode_ctl-2:2.1-12.37.el7_2 | cpe:/o:redhat:rhel_aus:7.2 | RHSA-2021:2300 | 2021-06-09T00:00:00Z |
| microcode_ctl-2:2.1-12.39.el7_2 | cpe:/o:redhat:rhel_aus:7.2 | RHSA-2021:3323 | 2021-08-31T00:00:00Z |
| Red Hat Enterprise Linux 7.3 Advanced Update Support | |||
| microcode_ctl-2:2.1-16.40.el7_3 | cpe:/o:redhat:rhel_aus:7.3 | RHSA-2021:2302 | 2021-06-09T00:00:00Z |
| microcode_ctl-2:2.1-16.42.el7_3 | cpe:/o:redhat:rhel_aus:7.3 | RHSA-2021:3322 | 2021-08-31T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Advanced Update Support | |||
| microcode_ctl-2:2.1-22.39.el7_4 | cpe:/o:redhat:rhel_aus:7.4 | RHSA-2021:2301 | 2021-06-09T00:00:00Z |
| microcode_ctl-2:2.1-22.41.el7_4 | cpe:/o:redhat:rhel_aus:7.4 | RHSA-2021:3255 | 2021-08-24T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Telco Extended Update Support | |||
| microcode_ctl-2:2.1-22.39.el7_4 | cpe:/o:redhat:rhel_tus:7.4 | RHSA-2021:2301 | 2021-06-09T00:00:00Z |
| microcode_ctl-2:2.1-22.41.el7_4 | cpe:/o:redhat:rhel_tus:7.4 | RHSA-2021:3255 | 2021-08-24T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions | |||
| microcode_ctl-2:2.1-22.39.el7_4 | cpe:/o:redhat:rhel_e4s:7.4 | RHSA-2021:2301 | 2021-06-09T00:00:00Z |
| microcode_ctl-2:2.1-22.41.el7_4 | cpe:/o:redhat:rhel_e4s:7.4 | RHSA-2021:3255 | 2021-08-24T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118) | |||
| microcode_ctl-2:2.1-47.21.el7_6 | cpe:/o:redhat:rhel_aus:7.6 | RHSA-2021:2303 | 2021-06-09T00:00:00Z |
| microcode_ctl-2:2.1-47.23.el7_6 | cpe:/o:redhat:rhel_aus:7.6 | RHSA-2021:3317 | 2021-08-31T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Telco Extended Update Support | |||
| microcode_ctl-2:2.1-47.21.el7_6 | cpe:/o:redhat:rhel_tus:7.6 | RHSA-2021:2303 | 2021-06-09T00:00:00Z |
| microcode_ctl-2:2.1-47.23.el7_6 | cpe:/o:redhat:rhel_tus:7.6 | RHSA-2021:3317 | 2021-08-31T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions | |||
| microcode_ctl-2:2.1-47.21.el7_6 | cpe:/o:redhat:rhel_e4s:7.6 | RHSA-2021:2303 | 2021-06-09T00:00:00Z |
| microcode_ctl-2:2.1-47.23.el7_6 | cpe:/o:redhat:rhel_e4s:7.6 | RHSA-2021:3317 | 2021-08-31T00:00:00Z |
| Red Hat Enterprise Linux 7.7 Extended Update Support | |||
| microcode_ctl-2:2.1-53.16.el7_7 | cpe:/o:redhat:rhel_eus:7.7 | RHSA-2021:2304 | 2021-06-09T00:00:00Z |
| microcode_ctl-2:2.1-53.18.el7_7 | cpe:/o:redhat:rhel_eus:7.7 | RHSA-2021:3029 | 2021-08-10T00:00:00Z |
| Red Hat Enterprise Linux 8 | |||
| microcode_ctl-4:20210216-1.20210525.1.el8_4 | cpe:/o:redhat:enterprise_linux:8 | RHSA-2021:2308 | 2021-06-09T00:00:00Z |
| microcode_ctl-4:20210216-1.20210608.1.el8_4 | cpe:/o:redhat:enterprise_linux:8 | RHSA-2021:3027 | 2021-08-09T00:00:00Z |
| Red Hat Enterprise Linux 8.1 Extended Update Support | |||
| microcode_ctl-4:20190618-1.20210525.1.el8_1 | cpe:/o:redhat:rhel_eus:8.1 | RHSA-2021:2306 | 2021-06-09T00:00:00Z |
| microcode_ctl-4:20190618-1.20210608.1.el8_1 | cpe:/o:redhat:rhel_eus:8.1 | RHSA-2021:3176 | 2021-08-17T00:00:00Z |
| Red Hat Enterprise Linux 8.2 Extended Update Support | |||
| microcode_ctl-4:20191115-4.20210525.1.el8_2 | cpe:/o:redhat:rhel_eus:8.2 | RHSA-2021:2307 | 2021-06-09T00:00:00Z |
| microcode_ctl-4:20191115-4.20210608.1.el8_2 | cpe:/o:redhat:rhel_eus:8.2 | RHSA-2021:3364 | 2021-08-31T00:00:00Z |
| Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 | |||
| redhat-virtualization-host-0:4.3.16-20210615.0.el7_9 | cpe:/o:redhat:enterprise_linux:7::hypervisor | RHSA-2021:2519 | 2021-06-22T00:00:00Z |
| Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | |||
| redhat-virtualization-host-0:4.4.6-20210615.0.el8_4 | cpe:/o:redhat:rhev_hypervisor:4.4::el8 | RHSA-2021:2522 | 2021-06-22T00:00:00Z |
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2718-1 | intel-microcode security update |
Debian DSA |
DSA-4934-1 | intel-microcode security update |
EUVD |
EUVD-2020-17209 | Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. |
Ubuntu USN |
USN-4985-1 | Intel Microcode vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-08-04T15:12:09.228Z
Reserved: 2020-08-19T00:00:00
Link: CVE-2020-24489
No data.
Status : Modified
Published: 2021-06-09T20:15:08.140
Modified: 2024-11-21T05:14:54.160
Link: CVE-2020-24489
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN