Register file data sampling in Intel Atom Processors



Published: 2024-03-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-28746
CWE-ID CWE-200
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Intel Atom Processor E3900 Series
Hardware solutions / Other hardware appliances

Intel Atom C processor family
Hardware solutions / Firmware

Intel Pentium Processor Silver Series
Hardware solutions / Firmware

Intel Celeron Processor J Series
Hardware solutions / Firmware

Intel Celeron Processor N Series
Hardware solutions / Firmware

Intel Atom Processors
Hardware solutions / Firmware

Intel Atom Processor P5900
Hardware solutions / Firmware

Intel Atom Processor C5000
Hardware solutions / Firmware

Intel Atom Processor P5300
Hardware solutions / Firmware

Intel Atom Processor P5700
Hardware solutions / Firmware

12th Generation Intel Core Processors
Hardware solutions / Firmware

Intel Pentium Gold Processor Series
Hardware solutions / Firmware

Intel Celeron Processors
Hardware solutions / Firmware

13th Generation Intel Core Processors
Hardware solutions / Firmware

14th Generation Intel Core Processors
Hardware solutions / Firmware

Intel Core Processor N series
Hardware solutions / Firmware

Intel Processor N-series
Hardware solutions / Firmware

Intel Atom Processor X Series
Hardware solutions / Firmware

Intel Processor U-series
Hardware solutions / Firmware

Vendor Intel

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU87457

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-28746

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to information exposure through microarchitectural state after transient execution from some register files for some Intel Atom Processors. A local user can gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Intel Atom Processor E3900 Series: All versions

Intel Atom C processor family: All versions

Intel Pentium Processor Silver Series: All versions

Intel Celeron Processor J Series: All versions

Intel Celeron Processor N Series: All versions

Intel Atom Processors: All versions

Intel Atom Processor P5900: All versions

Intel Atom Processor C5000: All versions

Intel Atom Processor P5300: All versions

Intel Atom Processor P5700: All versions

12th Generation Intel Core Processors: All versions

Intel Pentium Gold Processor Series: All versions

Intel Celeron Processors: All versions

13th Generation Intel Core Processors: All versions

14th Generation Intel Core Processors: All versions

Intel Core Processor N series: All versions

Intel Processor N-series: All versions

Intel Atom Processor X Series: All versions

Intel Processor U-series: All versions

External links

http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###