{"uuid": "cc272d5f-7eb0-4e7d-981e-b3829cebe2b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23583", "type": "seen", "source": "https://t.me/KomunitiSiber/1075", "content": "Reptar: New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments\nhttps://thehackernews.com/2023/11/reptar-new-intel-cpu-vulnerability.html\n\nIntel has released fixes to close out a high-severity flaw codenamed\u00a0Reptar\u00a0that impacts its desktop, mobile, and server CPUs.\nTracked as\u00a0CVE-2023-23583\u00a0(CVSS score: 8.8), the\u00a0issue\u00a0has the potential to \"allow escalation of privilege and/or information disclosure and/or denial of service via local access.\"\nSuccessful exploitation of the vulnerability could also permit a bypass of the CPU's", "creation_timestamp": "2023-11-15T09:09:41.000000Z"}