Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
History

Thu, 14 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Intel
Intel 3rd Generation Intel Xeon Scalable Processor Family
Intel 4th Generation Intel Xeon Processor Scalable Family
Intel 5th Generation Intel Xeon Processor Scalable Family
Intel xeon D Processor
CPEs cpe:2.3:h:intel:3rd_generation_intel_xeon_scalable_processor_family:606a6:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_generation_intel_xeon_processor_scalable_family:806f7:*:*:*:*:*:*:*
cpe:2.3:h:intel:4th_generation_intel_xeon_processor_scalable_family:806f8:*:*:*:*:*:*:*
cpe:2.3:h:intel:5th_generation_intel_xeon_processor_scalable_family:c06f2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_d_processor:606c1:*:*:*:*:*:*:*
Vendors & Products Intel
Intel 3rd Generation Intel Xeon Scalable Processor Family
Intel 4th Generation Intel Xeon Processor Scalable Family
Intel 5th Generation Intel Xeon Processor Scalable Family
Intel xeon D Processor
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 20:45:00 +0000

Type Values Removed Values Added
Description Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
Weaknesses CWE-276
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published: 2024-11-13T20:34:17.825Z

Updated: 2024-11-14T19:49:08.207Z

Reserved: 2024-01-24T04:00:22.652Z

Link: CVE-2024-21820

cve-icon Vulnrichment

Updated: 2024-11-14T18:41:13.104Z

cve-icon NVD

Status : Received

Published: 2024-11-13T21:15:09.653

Modified: 2024-11-13T21:15:09.653

Link: CVE-2024-21820

cve-icon Redhat

No data.