Description
Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
Published: 2024-03-14
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3808-1 intel-microcode security update
EUVD EUVD EUVD-2023-26785 Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
Ubuntu USN Ubuntu USN USN-6797-1 Intel Microcode vulnerabilities
History

Fri, 14 Feb 2025 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Intel
Intel 3rd Gen Intel Xeon Scalable Processor Family
Intel 4th Gen Intel Xeon Bronze Processors
Intel 4th Gen Intel Xeon Gold Processors
Intel 4th Gen Intel Xeon Platinum Processors
Intel 4th Gen Intel Xeon Scalable Processors
Intel 4th Gen Intel Xeon Scalable Processors With Intel Vran
Intel 4th Gen Intel Xeon Silver Processors
Intel 4th Generation Intel Xeon Gold Processors
Intel 4th Generation Intel Xeon Platinum Processors
Intel xeon Cpu Max Series Processors
Intel xeon D Processor
CPEs cpe:2.3:a:intel:3rd_gen_intel_xeon_scalable_processor_family:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_gen_intel_xeon_bronze_processors:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_gen_intel_xeon_gold_processors:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_gen_intel_xeon_platinum_processors:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_gen_intel_xeon_scalable_processors:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_gen_intel_xeon_scalable_processors_with_intel_vran:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_gen_intel_xeon_silver_processors:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_generation_intel_xeon_gold_processors:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_generation_intel_xeon_platinum_processors:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_cpu_max_series_processors:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_d_processor:*:*:*:*:*:*:*:*
Vendors & Products Intel
Intel 3rd Gen Intel Xeon Scalable Processor Family
Intel 4th Gen Intel Xeon Bronze Processors
Intel 4th Gen Intel Xeon Gold Processors
Intel 4th Gen Intel Xeon Platinum Processors
Intel 4th Gen Intel Xeon Scalable Processors
Intel 4th Gen Intel Xeon Scalable Processors With Intel Vran
Intel 4th Gen Intel Xeon Silver Processors
Intel 4th Generation Intel Xeon Gold Processors
Intel 4th Generation Intel Xeon Platinum Processors
Intel xeon Cpu Max Series Processors
Intel xeon D Processor
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux

Subscriptions

Intel 3rd Gen Intel Xeon Scalable Processor Family 4th Gen Intel Xeon Bronze Processors 4th Gen Intel Xeon Gold Processors 4th Gen Intel Xeon Platinum Processors 4th Gen Intel Xeon Scalable Processors 4th Gen Intel Xeon Scalable Processors With Intel Vran 4th Gen Intel Xeon Silver Processors 4th Generation Intel Xeon Gold Processors 4th Generation Intel Xeon Platinum Processors Xeon Cpu Max Series Processors Xeon D Processor
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2025-02-13T16:44:02.893Z

Reserved: 2023-01-27T04:00:04.248Z

Link: CVE-2023-22655

cve-icon Vulnrichment

Updated: 2024-08-02T10:13:49.758Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-14T17:15:49.930

Modified: 2024-11-21T07:45:08.600

Link: CVE-2023-22655

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-03-12T00:00:00Z

Links: CVE-2023-22655 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses