Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-9hpm-6w4c-hxh2
Vulnerability from github
Published
2024-03-14 18:30
Modified
2024-04-05 09:30
Severity ?
VLAI Severity ?
Details
On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
{
"affected": [],
"aliases": [
"CVE-2023-32666"
],
"database_specific": {
"cwe_ids": [
"CWE-1191"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-03-14T17:15:51Z",
"severity": "HIGH"
},
"details": "On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.",
"id": "GHSA-9hpm-6w4c-hxh2",
"modified": "2024-04-05T09:30:38Z",
"published": "2024-03-14T18:30:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32666"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240405-0010"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
CVE-2023-32666 (GCVE-0-2023-32666)
Vulnerability from cvelistv5
Published
2024-03-14 16:45
Modified
2025-02-13 16:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- escalation of privilege
- CWE-1191 - On-chip debug and test interface with improper access control
Summary
On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX |
Version: some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T15:25:36.717Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240405-0010/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:intel:e3-1220l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1226_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1230l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1231_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1241_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1246_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1265l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1271_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1275l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1276_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1281_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1285l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1286_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1286l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1428l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2408l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2418l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2428l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2438l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2603_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2608l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2609_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2618l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2623_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2628l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2630l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2637_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2643_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2648l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2650l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2658a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2658_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2667_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2683_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2687w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2690_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2697_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2698_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2699_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4627_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4648_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4667_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4669_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4809_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8860_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8867_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8880l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8891_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8893_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3040_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3065_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3104_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3106_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3204_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3206r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4108_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4109t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4112_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4114t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4116_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4116t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4208r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4209t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4210r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4214c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4214_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4214r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4214y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4216_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4216r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5030_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5040_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5063_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5115_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5118_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5119t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5120t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5140_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5215l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5215m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5215r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5217_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5218b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5218_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5218n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5218t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5220r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5220s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5220t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5222_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6126f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6126_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6126t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6128_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6130f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6130t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6132_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6134_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6134m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6136_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6138f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6138_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6138t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6140_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6140m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6142f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6142_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6142m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6144_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6146_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6148f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6148_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6152_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6154_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6222v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6226_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6230n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6230t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6234_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6238_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6238l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6238m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6238t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6240_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6240l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6240m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6240y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6242_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6244_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6246_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6248_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6252_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6252n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6254_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6262v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7030_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7040_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7041_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7110m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7110n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7120m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7120n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7130m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7130n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7140m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7140n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_7150n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8153_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8156_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8158_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8160f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8160m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8160t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8164_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8168_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8170_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8170m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8176f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8176_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8176m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8180m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8253_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8256_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8260_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8260l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8260m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8260y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8268_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8270_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8276_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8276l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8276m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8280l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8280m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_9220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_9221_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_9222_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_9242_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_9282_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_3206r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_3408u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_processors_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1524n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1563n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1564n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1573n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1581_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1587_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1612_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d1700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1731nte_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d2700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2745nx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2757nx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2777nx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2798nx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-1105c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2104g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:windows:*:*",
"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:windows:*:*",
"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xeon_e-2124g_firmware",
"vendor": "intel",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-32666",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-15T18:02:00.632301Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-26T20:44:28.557Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-1191",
"description": "On-chip debug and test interface with improper access control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-05T09:05:53.842Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0010/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-32666",
"datePublished": "2024-03-14T16:45:44.785Z",
"dateReserved": "2023-08-04T03:00:04.683Z",
"dateUpdated": "2025-02-13T16:54:56.071Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…