Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.00266.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Intel
Subscribe
|
Core I3-1000g1
Subscribe
Core I3-1000g4
Subscribe
Core I3-1005g1
Subscribe
Core I3-1110g4
Subscribe
Core I3-1115g4
Subscribe
Core I3-1120g4
Subscribe
Core I3-1125g4
Subscribe
Core I5-1030g4
Subscribe
Core I5-1030g7
Subscribe
Core I5-1035g1
Subscribe
Core I5-1035g4
Subscribe
Core I5-1035g7
Subscribe
Core I5-1130g7
Subscribe
Core I5-1135g7
Subscribe
Core I7-1060g7
Subscribe
Core I7-1065g7
Subscribe
Core I7-1160g7
Subscribe
Core I7-1165g7
Subscribe
Core I7-1185g7
Subscribe
Microcode
Subscribe
|
|
Netapp
Subscribe
|
|
|
Redhat
Subscribe
|
|
|
Siemens
Subscribe
|
Simatic Field Pg M5
Subscribe
Simatic Field Pg M5 Firmware
Subscribe
Simatic Field Pg M6
Subscribe
Simatic Field Pg M6 Firmware
Subscribe
Simatic Ipc427e
Subscribe
Simatic Ipc427e Firmware
Subscribe
Simatic Ipc477e
Subscribe
Simatic Ipc477e Firmware
Subscribe
Simatic Ipc477e Pro
Subscribe
Simatic Ipc477e Pro Firmware
Subscribe
Simatic Ipc627e
Subscribe
Simatic Ipc627e Firmware
Subscribe
Simatic Ipc647e
Subscribe
Simatic Ipc647e Firmware
Subscribe
Simatic Ipc677e
Subscribe
Simatic Ipc677e Firmware
Subscribe
Simatic Ipc847e
Subscribe
Simatic Ipc847e Firmware
Subscribe
Simatic Itp1000
Subscribe
Simatic Itp1000 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
|
Configuration 7 [-]
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
| Package | CPE | Advisory | Released Date |
|---|---|---|---|
| Red Hat Enterprise Linux 6 | |||
| microcode_ctl-2:1.17-33.31.el6_10 | cpe:/o:redhat:enterprise_linux:6 | RHSA-2020:5084 | 2020-11-11T00:00:00Z |
| Red Hat Enterprise Linux 6.5 Advanced Update Support | |||
| microcode_ctl-2:1.17-17.34.el6_5 | cpe:/o:redhat:rhel_aus:6.5 | RHSA-2020:5189 | 2020-11-23T00:00:00Z |
| Red Hat Enterprise Linux 6.6 Advanced Update Support | |||
| microcode_ctl-2:1.17-19.32.el6_6 | cpe:/o:redhat:rhel_aus:6.6 | RHSA-2020:5184 | 2020-11-23T00:00:00Z |
| Red Hat Enterprise Linux 7 | |||
| microcode_ctl-2:2.1-73.2.el7_9 | cpe:/o:redhat:enterprise_linux:7 | RHSA-2020:5083 | 2020-11-11T00:00:00Z |
| microcode_ctl-2:2.1-73.11.el7_9 | cpe:/o:redhat:enterprise_linux:7 | RHSA-2021:3028 | 2021-08-09T00:00:00Z |
| Red Hat Enterprise Linux 7.2 Advanced Update Support | |||
| microcode_ctl-2:2.1-12.34.el7_2 | cpe:/o:redhat:rhel_aus:7.2 | RHSA-2020:5188 | 2020-11-23T00:00:00Z |
| microcode_ctl-2:2.1-12.39.el7_2 | cpe:/o:redhat:rhel_aus:7.2 | RHSA-2021:3323 | 2021-08-31T00:00:00Z |
| Red Hat Enterprise Linux 7.3 Advanced Update Support | |||
| microcode_ctl-2:2.1-16.37.el7_3 | cpe:/o:redhat:rhel_aus:7.3 | RHSA-2020:5183 | 2020-11-23T00:00:00Z |
| microcode_ctl-2:2.1-16.42.el7_3 | cpe:/o:redhat:rhel_aus:7.3 | RHSA-2021:3322 | 2021-08-31T00:00:00Z |
| Red Hat Enterprise Linux 7.3 Telco Extended Update Support | |||
| microcode_ctl-2:2.1-16.37.el7_3 | cpe:/o:redhat:rhel_tus:7.3 | RHSA-2020:5183 | 2020-11-23T00:00:00Z |
| Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions | |||
| microcode_ctl-2:2.1-16.37.el7_3 | cpe:/o:redhat:rhel_e4s:7.3 | RHSA-2020:5183 | 2020-11-23T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Advanced Update Support | |||
| microcode_ctl-2:2.1-22.36.el7_4 | cpe:/o:redhat:rhel_aus:7.4 | RHSA-2020:5182 | 2020-11-23T00:00:00Z |
| microcode_ctl-2:2.1-22.41.el7_4 | cpe:/o:redhat:rhel_aus:7.4 | RHSA-2021:3255 | 2021-08-24T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Telco Extended Update Support | |||
| microcode_ctl-2:2.1-22.36.el7_4 | cpe:/o:redhat:rhel_tus:7.4 | RHSA-2020:5182 | 2020-11-23T00:00:00Z |
| microcode_ctl-2:2.1-22.41.el7_4 | cpe:/o:redhat:rhel_tus:7.4 | RHSA-2021:3255 | 2021-08-24T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions | |||
| microcode_ctl-2:2.1-22.36.el7_4 | cpe:/o:redhat:rhel_e4s:7.4 | RHSA-2020:5182 | 2020-11-23T00:00:00Z |
| microcode_ctl-2:2.1-22.41.el7_4 | cpe:/o:redhat:rhel_e4s:7.4 | RHSA-2021:3255 | 2021-08-24T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118) | |||
| microcode_ctl-2:2.1-47.23.el7_6 | cpe:/o:redhat:rhel_aus:7.6 | RHSA-2021:3317 | 2021-08-31T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Extended Update Support | |||
| microcode_ctl-2:2.1-47.18.el7_6 | cpe:/o:redhat:rhel_eus:7.6 | RHSA-2020:5181 | 2020-11-23T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Telco Extended Update Support | |||
| microcode_ctl-2:2.1-47.23.el7_6 | cpe:/o:redhat:rhel_tus:7.6 | RHSA-2021:3317 | 2021-08-31T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions | |||
| microcode_ctl-2:2.1-47.23.el7_6 | cpe:/o:redhat:rhel_e4s:7.6 | RHSA-2021:3317 | 2021-08-31T00:00:00Z |
| Red Hat Enterprise Linux 7.7 Extended Update Support | |||
| microcode_ctl-2:2.1-53.13.el7_7 | cpe:/o:redhat:rhel_eus:7.7 | RHSA-2020:5190 | 2020-11-23T00:00:00Z |
| microcode_ctl-2:2.1-53.18.el7_7 | cpe:/o:redhat:rhel_eus:7.7 | RHSA-2021:3029 | 2021-08-10T00:00:00Z |
| Red Hat Enterprise Linux 8 | |||
| microcode_ctl-4:20200609-2.20201027.1.el8_3 | cpe:/o:redhat:enterprise_linux:8 | RHSA-2020:5085 | 2020-11-11T00:00:00Z |
| microcode_ctl-4:20210216-1.20210608.1.el8_4 | cpe:/o:redhat:enterprise_linux:8 | RHSA-2021:3027 | 2021-08-09T00:00:00Z |
| Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions | |||
| microcode_ctl-4:20180807a-2.20201112.1.el8_0 | cpe:/o:redhat:rhel_e4s:8.0 | RHSA-2020:5186 | 2020-11-23T00:00:00Z |
| Red Hat Enterprise Linux 8.1 Extended Update Support | |||
| microcode_ctl-4:20190618-1.20201112.1.el8_1 | cpe:/o:redhat:rhel_eus:8.1 | RHSA-2020:5369 | 2020-12-08T00:00:00Z |
| microcode_ctl-4:20190618-1.20210608.1.el8_1 | cpe:/o:redhat:rhel_eus:8.1 | RHSA-2021:3176 | 2021-08-17T00:00:00Z |
| Red Hat Enterprise Linux 8.2 Extended Update Support | |||
| microcode_ctl-4:20191115-4.20201112.1.el8_2 | cpe:/o:redhat:rhel_eus:8.2 | RHSA-2020:5185 | 2020-11-23T00:00:00Z |
| microcode_ctl-4:20191115-4.20210608.1.el8_2 | cpe:/o:redhat:rhel_eus:8.2 | RHSA-2021:3364 | 2021-08-31T00:00:00Z |
No data.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2546-1 | intel-microcode security update |
EUVD |
EUVD-2020-29546 | Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. |
Ubuntu USN |
USN-4628-1 | Intel Microcode vulnerabilities |
Ubuntu USN |
USN-4628-3 | Intel Microcode vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-08-04T10:03:46.326Z
Reserved: 2020-02-06T00:00:00
Link: CVE-2020-8698
No data.
Status : Modified
Published: 2020-11-12T18:15:16.783
Modified: 2024-11-21T05:39:17.130
Link: CVE-2020-8698
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN