cve-2023-32666
Vulnerability from cvelistv5
Published
2024-03-14 16:45
Modified
2024-08-26 20:44
Summary
On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.717Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240405-0010/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:intel:e3-1220l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1226_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1230l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1231_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1241_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1246_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1265l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1271_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1275l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1276_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1281_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1285l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1286_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e3-1286l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-1428l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-1620_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-1630_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-1650_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-1660_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-1680_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2408l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2418l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2428l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2438l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2603_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2608l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2609_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2618l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2620_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2623_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2628l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2630_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2630l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2637_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2640_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2643_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2648l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2650_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2650l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2658a_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2658_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2660_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2667_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2670_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2680_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2683_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2687w_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2690_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2695_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2697_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2698_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-2699_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-4610_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-4620_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-4627_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-4640_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-4648_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-4650_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-4655_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-4660_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-4667_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e5-4669_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-4809_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-4820_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-4830_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-4850_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-8860_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-8867_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-8870_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-8880_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-8880l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-8890_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-8891_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:e7-8893_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_3040_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_3050_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_3060_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_3065_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_3070_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_3104_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_3106_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_3204_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_3206r_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4108_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4109t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4110_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4112_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4114_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4114t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4116_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4116t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4208_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4208r_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4209t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4210_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4210r_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4214c_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4214_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4214r_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4214y_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4215_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4216_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_4216r_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5030_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5040_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5050_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5060_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5063_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5070_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5080_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5110_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5115_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5118_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5119t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5120_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5120t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5122_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5130_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5140_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5150_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5160_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5215_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5215l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5215m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5215r_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5217_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5218b_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5218_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5218n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5218t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5220_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5220r_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5220s_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5220t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_5222_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6126f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6126_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6126t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6128_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6130f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6130_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6130t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6132_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6134_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6134m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6136_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6138f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6138_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6138t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6140_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6140m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6142f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6142_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6142m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6144_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6146_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6148f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6148_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6150_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6152_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6154_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6222v_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6226_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6230_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6230n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6230t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6234_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6238_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6238l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6238m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6238t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6240_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6240l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6240m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6240y_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6242_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6244_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6246_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6248_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6252_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6252n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6254_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_6262v_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7020_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7030_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7040_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7041_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7110m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7110n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7120m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7120n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7130m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7130n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7140m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7140n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_7150n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8153_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8156_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8158_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8160f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8160_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8160m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8160t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8164_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8168_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8170_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8170m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8176f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8176_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8176m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8180_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8180m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8253_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8256_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8260_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8260l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8260m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8260y_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8268_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8270_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8276_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8276l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8276m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8280_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8280l_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_8280m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_9220_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_9221_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_9222_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_9242_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_9282_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_bronze_3206r_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_bronze_3408u_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_bronze_processors_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1524n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1563n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1564n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1573n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1581_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1587_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1612_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1632_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d1700_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1731nte_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d2700_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2745nx_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2757nx_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2777nx_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2798nx_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_e-1105c_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_e-2104g_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:windows:*:*",
              "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:windows:*:*",
              "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "xeon_e-2124g_firmware",
            "vendor": "intel",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32666",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-15T18:02:00.632301Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-26T20:44:28.557Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-1191",
              "description": "On-chip debug and test interface with improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-14T16:45:44.785Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240405-0010/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-32666",
    "datePublished": "2024-03-14T16:45:44.785Z",
    "dateReserved": "2023-08-04T03:00:04.683Z",
    "dateUpdated": "2024-08-26T20:44:28.557Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-32666\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2024-03-14T17:15:51.140\",\"lastModified\":\"2024-04-05T09:15:08.497\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.\"},{\"lang\":\"es\",\"value\":\"La interfaz de prueba y depuraci\u00f3n en el chip con control de acceso inadecuado en algunos procesadores Intel(R) Xeon(R) de cuarta generaci\u00f3n cuando se utiliza Intel(R) SGX o Intel(R) TDX puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s de local acceso.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1191\"}]}],\"references\":[{\"url\":\"https://security.netapp.com/advisory/ntap-20240405-0010/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html\",\"source\":\"secure@intel.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.