Impact
Default cryptographic keys embedded in the silicon of certain Intel Pentium Silver, Celeron J, and Celeron N processors enable an attacker with privileged user access to elevate privileges. The flaw arises from using a predictable hardware key instead of a random one, allowing manipulation of cryptographic operations. The impact on confidentiality is high; integrity and availability are not directly compromised. The likely attack vector involves physical access to the hardware combined with privileged credentials and deep knowledge of the processor internals.
Affected Systems
The vulnerability affects all Intel Pentium Silver series, Celeron J series, and Celeron N series processors. No specific firmware or bootstrap version information is provided, so each unit of the listed families should be examined. Organizations using these CPUs should verify whether default cryptographic keys are in use and whether they belong to the affected families.
Risk and Exploitability
The CVSS score of 5.8 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The advisory is not listed in the CISA KEV catalog, indicating no known public exploitation. Because the attack requires physical access, privileged user rights, and sophisticated hardware reverse engineering, the risk is moderate. Software fixes are limited; updates are typically delivered via microcode or BIOS modifications.
OpenCVE Enrichment