Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2020-24511 CVE-2020-24512 |
CWE-ID | CWE-200 CWE-203 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Legacy Intel Core Processors Hardware solutions / Firmware Intel Xeon E Processors Hardware solutions / Firmware Intel Core X-series Processors Hardware solutions / Firmware Intel Atom Processor Z Series Hardware solutions / Firmware Intel Celeron Processor J Series Hardware solutions / Firmware Intel Celeron Processor N Series Hardware solutions / Firmware Intel Atom Processor E3800 Product Family Hardware solutions / Firmware Legacy Intel Pentium Processors Hardware solutions / Firmware Legacy Intel Celeron Processors Hardware solutions / Firmware 3rd Generation Intel Core Processors Hardware solutions / Firmware Intel Pentium Processors Hardware solutions / Firmware Intel Celeron Processors Hardware solutions / Firmware 4th Generation Intel Core Processor Family Hardware solutions / Firmware 1th Generation Intel Core Processor Family Hardware solutions / Firmware 2nd Generation Intel Core Processor Family Hardware solutions / Firmware 3rd Intel Xeon E processor family Hardware solutions / Firmware 5th Generation Intel Core Processor Family Hardware solutions / Firmware Intel Atom Processors Hardware solutions / Firmware Intel Atom Processor X Series Hardware solutions / Firmware Intel Atom C processor family Hardware solutions / Firmware 6th Generation Intel Core Processors Hardware solutions / Firmware Intel Xeon D Processors Hardware solutions / Firmware Intel Xeon W Processors Hardware solutions / Firmware 2nd Generation Intel Xeon Scalable Processors Hardware solutions / Firmware Intel Core X-series Processor Hardware solutions / Firmware 3rd Generation Intel Xeon Scalable Processors Hardware solutions / Firmware Intel Atom Processor A Series Hardware solutions / Firmware Intel Puma 7 Family Hardware solutions / Firmware Intel Pentium Processor Silver Series Hardware solutions / Firmware 10th Generation Intel Core Processors Hardware solutions / Firmware Intel Core Processors with Intel Hybrid Technology Hardware solutions / Firmware 11th Generation Intel Core Processors Hardware solutions / Firmware 8th Generation Intel Core Processors Hardware solutions / Firmware 7th Generation Intel Core Processors Hardware solutions / Firmware Intel Pentium Gold Processor Series Hardware solutions / Firmware Intel Celeron Processor 5000 Series Hardware solutions / Firmware Intel Celeron Processor G Series Hardware solutions / Firmware Intel Pentium Processor J Series Hardware solutions / Other hardware appliances Intel Pentium Processor N Series Hardware solutions / Other hardware appliances Intel Xeon Scalable Processors Hardware solutions / Other hardware appliances Intel Atom Processor E3900 Series Hardware solutions / Other hardware appliances 9th Generation Intel Core Processors Client/Desktop applications / Web browsers |
Vendor | Intel |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU54203
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-24511
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to improper isolation of shared resources. A local user can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLegacy Intel Core Processors: All versions
Intel Xeon E Processors: All versions
Intel Core X-series Processors: All versions
Intel Atom Processor Z Series: All versions
Intel Celeron Processor J Series: All versions
Intel Celeron Processor N Series: All versions
Intel Pentium Processor J Series: All versions
Intel Pentium Processor N Series: All versions
Intel Atom Processor E3800 Product Family: All versions
Legacy Intel Pentium Processors: All versions
Legacy Intel Celeron Processors: All versions
3rd Generation Intel Core Processors: All versions
Intel Pentium Processors: All versions
Intel Celeron Processors: All versions
4th Generation Intel Core Processor Family: All versions
1th Generation Intel Core Processor Family: All versions
2nd Generation Intel Core Processor Family: All versions
3rd Intel Xeon E processor family: All versions
5th Generation Intel Core Processor Family: All versions
Intel Atom Processors: All versions
Intel Atom Processor X Series: All versions
Intel Atom C processor family: All versions
6th Generation Intel Core Processors: All versions
Intel Xeon Scalable Processors: All versions
Intel Xeon D Processors: All versions
Intel Xeon W Processors: All versions
2nd Generation Intel Xeon Scalable Processors: All versions
Intel Core X-series Processor: All versions
3rd Generation Intel Xeon Scalable Processors: All versions
Intel Atom Processor A Series: All versions
Intel Atom Processor E3900 Series: All versions
Intel Puma 7 Family: All versions
Intel Pentium Processor Silver Series: All versions
10th Generation Intel Core Processors: All versions
Intel Core Processors with Intel Hybrid Technology: All versions
11th Generation Intel Core Processors: All versions
8th Generation Intel Core Processors: All versions
7th Generation Intel Core Processors: All versions
Intel Pentium Gold Processor Series: All versions
Intel Celeron Processor 5000 Series: All versions
Intel Celeron Processor G Series: All versions
9th Generation Intel Core Processors: All versions
CPE2.3 External linkshttp://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html
http://security.netapp.com/advisory/ntap-20210611-0005/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU54204
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-24512
CWE-ID:
CWE-203 - Observable discrepancy
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to observable timing discrepancy. A local user can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLegacy Intel Core Processors: All versions
Intel Xeon E Processors: All versions
Intel Core X-series Processors: All versions
Intel Atom Processor Z Series: All versions
Intel Celeron Processor J Series: All versions
Intel Celeron Processor N Series: All versions
Intel Pentium Processor J Series: All versions
Intel Pentium Processor N Series: All versions
Intel Atom Processor E3800 Product Family: All versions
Legacy Intel Pentium Processors: All versions
Legacy Intel Celeron Processors: All versions
3rd Generation Intel Core Processors: All versions
Intel Pentium Processors: All versions
Intel Celeron Processors: All versions
4th Generation Intel Core Processor Family: All versions
1th Generation Intel Core Processor Family: All versions
2nd Generation Intel Core Processor Family: All versions
3rd Intel Xeon E processor family: All versions
5th Generation Intel Core Processor Family: All versions
Intel Atom Processors: All versions
Intel Atom Processor X Series: All versions
Intel Atom C processor family: All versions
6th Generation Intel Core Processors: All versions
Intel Xeon Scalable Processors: All versions
Intel Xeon D Processors: All versions
Intel Xeon W Processors: All versions
2nd Generation Intel Xeon Scalable Processors: All versions
Intel Core X-series Processor: All versions
3rd Generation Intel Xeon Scalable Processors: All versions
Intel Atom Processor A Series: All versions
Intel Atom Processor E3900 Series: All versions
Intel Puma 7 Family: All versions
Intel Pentium Processor Silver Series: All versions
10th Generation Intel Core Processors: All versions
Intel Core Processors with Intel Hybrid Technology: All versions
11th Generation Intel Core Processors: All versions
8th Generation Intel Core Processors: All versions
7th Generation Intel Core Processors: All versions
Intel Pentium Gold Processor Series: All versions
Intel Celeron Processor 5000 Series: All versions
Intel Celeron Processor G Series: All versions
9th Generation Intel Core Processors: All versions
CPE2.3 External linkshttp://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html
http://security.netapp.com/advisory/ntap-20210611-0005/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?