Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-23960 |
CWE-ID | CWE-1037 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Cortex-R7 Hardware solutions / Firmware Cortex-R8 Hardware solutions / Firmware Cortex-A57 Hardware solutions / Firmware Cortex-A65 Hardware solutions / Firmware Cortex-A65AE Hardware solutions / Firmware Cortex-A72 Hardware solutions / Firmware Cortex-A73 Hardware solutions / Firmware Cortex-A75 Hardware solutions / Firmware Cortex-A76 Hardware solutions / Firmware Cortex-A77 Hardware solutions / Firmware Cortex-A78 Hardware solutions / Firmware Cortex-A78AE Hardware solutions / Firmware Cortex-A710 Hardware solutions / Firmware Neoverse-E1 Hardware solutions / Firmware Neoverse-N1 Hardware solutions / Firmware Neoverse-V1 Hardware solutions / Firmware Neoverse-N2 Hardware solutions / Firmware Cortex-X1 Hardware solutions / Firmware Cortex-X2 Hardware solutions / Firmware |
Vendor | ARM |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU65007
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-23960
CWE-ID:
CWE-1037 - Processor optimization removal or modification of security-critical code
Exploit availability: No
DescriptionThe vulnerability allows a local user to obtain potentially sensitive information.
The vulnerability exists due to improper restrictions of cache speculation. A local user can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches and gain access to sensitive information.
The vulnerability was dubbed Spectre-BHB.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCortex-R7: All versions
Cortex-R8: All versions
Cortex-A57: All versions
Cortex-A65: All versions
Cortex-A65AE: All versions
Cortex-A72: All versions
Cortex-A73: All versions
Cortex-A75: All versions
Cortex-A76: All versions
Cortex-A77: All versions
Cortex-A78: All versions
Cortex-A78AE: All versions
Cortex-A710: All versions
Neoverse-E1: All versions
Neoverse-N1: All versions
Neoverse-V1: All versions
Neoverse-N2: All versions
Cortex-X1: All versions
Cortex-X2: All versions
CPE2.3https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates
https://www.openwall.com/lists/oss-security/2022/03/18/2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.