Improper access control in Intel Xeon Processor E3 v6 Family - CVE-2019-0117

 

Improper access control in Intel Xeon Processor E3 v6 Family - CVE-2019-0117

Published: November 14, 2019


Vulnerability identifier: #VU22781
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2019-0117
CWE-ID: CWE-284
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Intel
Affected software:
Intel Xeon Processor E3 v6 Family

Detailed vulnerability description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 & E-2200 Processor Families with Intel(R) Processor Graphics. A local user can gain access to sensitive information.

The following processor families are affected:

  • 6th Generation Intel Core processors
  • 7th Generation Intel Core processors
  • 8th Generation Intel Core processors
  • 9th Generation Intel Core processors
  • Intel Xeon Processor E3 v5 Family
  • Intel Xeon Processor E3 v6 Family
  • Intel Xeon Processor E- 2100 Family
  • Intel Xeon Processor E-2200 Family

How to mitigate CVE-2019-0117

Install updates from vendor's website.

Sources