SB20230808151 - Information exposure through microarchitectural state after transient execution in Certain HPE StoreEasy Servers Using Certain Intel Processors



SB20230808151 - Information exposure through microarchitectural state after transient execution in Certain HPE StoreEasy Servers Using Certain Intel Processors

Published: August 8, 2023 Updated: July 29, 2025

Security Bulletin ID SB20230808151
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Information exposure through microarchitectural state after transient execution (CVE-ID: CVE-2022-40982)

The vulnerability allows a malicious guest to escalate privileges on the system.

The vulnerability exists due to the way data is shared between threads whereby the AVX GATHER instructions on Intel processors can forward the content of stale vector registers to dependent instructions. A malicious guest can infer data from different contexts on the same core and execute arbitrary code with elevated privileges.


Remediation

Install update from vendor's website.