A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.
History

Tue, 29 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2024-03-15T18:03:32.844Z

Updated: 2024-10-29T16:10:13.603Z

Reserved: 2024-03-05T15:11:04.573Z

Link: CVE-2024-2193

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:39.165Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-15T18:15:08.530

Modified: 2024-10-29T16:35:13.023

Link: CVE-2024-2193

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-03-12T00:00:00Z

Links: CVE-2024-2193 - Bugzilla