Vulnerability identifier: #VU101951
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-693
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
3rd Generation Intel Xeon Scalable Processors
Hardware solutions /
Firmware
Intel Xeon D Processors
Hardware solutions /
Firmware
4th Generation Intel Xeon Scalable Processors
Hardware solutions /
Firmware
4th Generation Intel Xeon Platinum processors
Hardware solutions /
Firmware
4th Generation Intel Xeon Gold Processors
Hardware solutions /
Firmware
4th Generation Intel Xeon Silver Processors
Hardware solutions /
Firmware
4th Generation Intel Xeon Bronze Processors
Hardware solutions /
Firmware
Intel Xeon CPU Max Series processors (High Bandwidth Memory HBM)
Hardware solutions /
Firmware
4th Generation Intel Xeon Scalable Processors with Intel vRAN
Hardware solutions /
Firmware
5th Generation Intel Xeon Scalable processors
Hardware solutions /
Firmware
4th Generation Intel Xeon Edge Enhanced Processors
Hardware solutions /
Other hardware appliances
Intel Xeon W2400 processor
Hardware solutions /
Other hardware appliances
Intel Xeon W3400 Processor
Hardware solutions /
Other hardware appliances
Vendor: Intel
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient implementation of security measures in the Sub-Page write Permissions (SPP). A local user can execute arbitrary code with elevated privileges.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
3rd Generation Intel Xeon Scalable Processors: All versions
Intel Xeon D Processors: All versions
4th Generation Intel Xeon Scalable Processors: All versions
4th Generation Intel Xeon Platinum processors: All versions
4th Generation Intel Xeon Gold Processors: All versions
4th Generation Intel Xeon Silver Processors: All versions
4th Generation Intel Xeon Bronze Processors: All versions
Intel Xeon CPU Max Series processors (High Bandwidth Memory HBM): All versions
4th Generation Intel Xeon Edge Enhanced Processors: All versions
4th Generation Intel Xeon Scalable Processors with Intel vRAN: All versions
Intel Xeon W2400 processor: All versions
Intel Xeon W3400 Processor: All versions
5th Generation Intel Xeon Scalable processors: All versions
External links
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01196.html
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.