Information disclosure in Intel processors RAPL interface



Published: 2024-09-17
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-23984
CWE-ID CWE-203
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
3rd Generation Intel Xeon Scalable Processors
Hardware solutions / Firmware

Intel Xeon D Processors
Hardware solutions / Firmware

Intel Processor Microcode Package for Linux
Hardware solutions / Firmware

Vendor Intel

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Observable discrepancy

EUVDB-ID: #VU97424

Risk: Low

CVSSv3.1: 2.2 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-23984

CWE-ID: CWE-203 - Observable discrepancy

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to observable discrepancy in Running Average Power Limit (RAPL) interface. A local privileged user can gain access to potentially sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

3rd Generation Intel Xeon Scalable Processors: All versions

Intel Xeon D Processors: All versions

Intel Processor Microcode Package for Linux: 20190312 - 20240813

External links

http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###