CVE-2023-32666
Vulnerability from cvelistv5
Published
2024-03-14 16:45
Modified
2024-08-26 20:44
Severity ?
EPSS score ?
Summary
On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240405-0010/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:intel:e3-1220l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1226_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1230l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1231_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1241_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1246_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1265l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1271_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1275l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1276_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1281_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1285l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1286_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1286l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1428l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2408l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2418l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2428l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2438l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2603_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2608l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2609_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2618l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2623_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2628l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2630l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2637_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2648l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2650l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2658a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2658_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2683_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2687w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2690_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2695_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2697_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2698_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2699_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4627_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4648_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4669_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4809_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8860_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8867_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8880_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8880l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8890_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8891_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8893_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3040_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3060_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3065_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3104_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3106_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3204_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_3206r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4108_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4109t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4112_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4114t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4116_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4116t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4208_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4208r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4209t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4210r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4214c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4214_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4214r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4214y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4216_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_4216r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5030_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5040_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5060_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5063_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5080_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5115_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5118_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5119t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5120t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5140_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5215l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5215m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5215r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5217_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5218b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5218_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5218n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5218t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5220r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5220s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5220t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_5222_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6126f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6126_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6126t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6128_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6130f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6130t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6132_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6134_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6134m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6136_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6138f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6138_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6138t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6140_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6140m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6142f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6142_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6142m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6144_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6146_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6148f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6148_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6152_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6154_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6222v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6226_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6230n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6230t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6234_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6238_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6238l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6238m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6238t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6240_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6240l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6240m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6240y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6242_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6244_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6246_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6248_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6252_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6252n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_6262v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7020_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7030_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7040_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7041_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7110m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7110n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7120m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7120n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7130m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7130n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7140m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7140n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_7150n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8153_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8156_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8158_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8160f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8160m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8160t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8164_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8168_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8170_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8170m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8176f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8176_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8176m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8180_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8180m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8253_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8256_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8260_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8260l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8260m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8260y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8268_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8270_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8276_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8276l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8276m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8280l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_8280m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_9220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_9221_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_9222_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_9242_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_9282_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3206r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3408u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_processors_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1524n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1563n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1564n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1573n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1581_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1587_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1612_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d1700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1731nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d2700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2745nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2757nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2777nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2798nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-1105c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2104g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:windows:*:*", "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:windows:*:*", "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "xeon_e-2124g_firmware", "vendor": "intel", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32666", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-15T18:02:00.632301Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-26T20:44:28.557Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX", "vendor": "n/a", "versions": [ { "status": "affected", "version": "some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX" } ] } ], "descriptions": [ { "lang": "en", "value": "On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" }, { "cweId": "CWE-1191", "description": "On-chip debug and test interface with improper access control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-14T16:45:44.785Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html" }, { "url": "https://security.netapp.com/advisory/ntap-20240405-0010/" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2023-32666", "datePublished": "2024-03-14T16:45:44.785Z", "dateReserved": "2023-08-04T03:00:04.683Z", "dateUpdated": "2024-08-26T20:44:28.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-32666\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2024-03-14T17:15:51.140\",\"lastModified\":\"2024-04-05T09:15:08.497\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.\"},{\"lang\":\"es\",\"value\":\"La interfaz de prueba y depuraci\u00f3n en el chip con control de acceso inadecuado en algunos procesadores Intel(R) Xeon(R) de cuarta generaci\u00f3n cuando se utiliza Intel(R) SGX o Intel(R) TDX puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s de local acceso.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1191\"}]}],\"references\":[{\"url\":\"https://security.netapp.com/advisory/ntap-20240405-0010/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html\",\"source\":\"secure@intel.com\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.