Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Changed
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.00019.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Intel
Subscribe
|
Atom C3308
Subscribe
Atom C3336
Subscribe
Atom C3338
Subscribe
Atom C3338r
Subscribe
Atom C3436l
Subscribe
Atom C3508
Subscribe
Atom C3538
Subscribe
Atom C3558
Subscribe
Atom C3558r
Subscribe
Atom C3558rc
Subscribe
Atom C3708
Subscribe
Atom C3750
Subscribe
Atom C3758
Subscribe
Atom C3758r
Subscribe
Atom C3808
Subscribe
Atom C3830
Subscribe
Atom C3850
Subscribe
Atom C3858
Subscribe
Atom C3950
Subscribe
Atom C3955
Subscribe
Atom C3958
Subscribe
Atom P5942b
Subscribe
Atom X5-a3930
Subscribe
Atom X5-a3940
Subscribe
Atom X5-a3950
Subscribe
Atom X5-a3960
Subscribe
Atom X6200fe
Subscribe
Atom X6211e
Subscribe
Atom X6212re
Subscribe
Atom X6413e
Subscribe
Atom X6425e
Subscribe
Atom X6425re
Subscribe
Atom X6427fe
Subscribe
Celeron J3355
Subscribe
Celeron J3355e
Subscribe
Celeron J3455
Subscribe
Celeron J3455e
Subscribe
Celeron J4005
Subscribe
Celeron J4025
Subscribe
Celeron J4105
Subscribe
Celeron J4125
Subscribe
Celeron J6413
Subscribe
Celeron N3350
Subscribe
Celeron N3350e
Subscribe
Celeron N3450
Subscribe
Celeron N4000
Subscribe
Celeron N4020
Subscribe
Celeron N4100
Subscribe
Celeron N4120
Subscribe
Celeron N6211
Subscribe
Core I3-l13g4
Subscribe
Core I5-l16g7
Subscribe
P5921b
Subscribe
P5931b
Subscribe
P5962b
Subscribe
Pentium J4205
Subscribe
Pentium J6425
Subscribe
Pentium N4200
Subscribe
Pentium N4200e
Subscribe
Pentium N6415
Subscribe
Pentium Silver J5005
Subscribe
Pentium Silver J5040
Subscribe
Pentium Silver N5000
Subscribe
Pentium Silver N5030
Subscribe
|
|
Redhat
Subscribe
|
|
|
Siemens
Subscribe
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
| Package | CPE | Advisory | Released Date |
|---|---|---|---|
| Red Hat Enterprise Linux 6 Extended Lifecycle Support | |||
| microcode_ctl-2:1.17-33.33.el6_10 | cpe:/o:redhat:rhel_els:6 | RHSA-2021:2299 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7 | |||
| microcode_ctl-2:2.1-73.9.el7_9 | cpe:/o:redhat:enterprise_linux:7 | RHSA-2021:2305 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7.2 Advanced Update Support | |||
| microcode_ctl-2:2.1-12.37.el7_2 | cpe:/o:redhat:rhel_aus:7.2 | RHSA-2021:2300 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7.3 Advanced Update Support | |||
| microcode_ctl-2:2.1-16.40.el7_3 | cpe:/o:redhat:rhel_aus:7.3 | RHSA-2021:2302 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Advanced Update Support | |||
| microcode_ctl-2:2.1-22.39.el7_4 | cpe:/o:redhat:rhel_aus:7.4 | RHSA-2021:2301 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Telco Extended Update Support | |||
| microcode_ctl-2:2.1-22.39.el7_4 | cpe:/o:redhat:rhel_tus:7.4 | RHSA-2021:2301 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions | |||
| microcode_ctl-2:2.1-22.39.el7_4 | cpe:/o:redhat:rhel_e4s:7.4 | RHSA-2021:2301 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118) | |||
| microcode_ctl-2:2.1-47.21.el7_6 | cpe:/o:redhat:rhel_aus:7.6 | RHSA-2021:2303 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Telco Extended Update Support | |||
| microcode_ctl-2:2.1-47.21.el7_6 | cpe:/o:redhat:rhel_tus:7.6 | RHSA-2021:2303 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions | |||
| microcode_ctl-2:2.1-47.21.el7_6 | cpe:/o:redhat:rhel_e4s:7.6 | RHSA-2021:2303 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 7.7 Extended Update Support | |||
| microcode_ctl-2:2.1-53.16.el7_7 | cpe:/o:redhat:rhel_eus:7.7 | RHSA-2021:2304 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 8 | |||
| microcode_ctl-4:20210216-1.20210525.1.el8_4 | cpe:/o:redhat:enterprise_linux:8 | RHSA-2021:2308 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 8.1 Extended Update Support | |||
| microcode_ctl-4:20190618-1.20210525.1.el8_1 | cpe:/o:redhat:rhel_eus:8.1 | RHSA-2021:2306 | 2021-06-09T00:00:00Z |
| Red Hat Enterprise Linux 8.2 Extended Update Support | |||
| microcode_ctl-4:20191115-4.20210525.1.el8_2 | cpe:/o:redhat:rhel_eus:8.2 | RHSA-2021:2307 | 2021-06-09T00:00:00Z |
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2718-1 | intel-microcode security update |
Debian DSA |
DSA-4934-1 | intel-microcode security update |
EUVD |
EUVD-2020-17233 | Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. |
Ubuntu USN |
USN-4985-1 | Intel Microcode vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-08-04T15:12:08.752Z
Reserved: 2020-08-19T00:00:00
Link: CVE-2020-24513
No data.
Status : Modified
Published: 2021-06-09T19:15:08.963
Modified: 2024-11-21T05:14:56.957
Link: CVE-2020-24513
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN