Security features bypass in Intel products - CVE-2022-0004

 

Security features bypass in Intel products - CVE-2022-0004

Published: May 22, 2022


Vulnerability identifier: #VU63503
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-0004
CWE-ID: CWE-254
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
10th Generation Intel Core Processors
11th Generation Intel Core Processors
12th Generation Intel Core Processors
Intel Celeron Processor 4000 Series
Intel Celeron Processor 6000 Series
Intel Celeron processor J3000/N3000 series
Intel Celeron J4000 Processors
Intel Celeron N4000 Processors
Intel Celeron Processor N Series
Intel Atom Processor P5000 Series
Intel Atom processor X E3900 series
Intel Atom Processor x6000E Series
Intel Celeron Processor J Series
Intel 100 Series Chipset
Intel 200 Series Chipset
Intel 300 Series Chipset
Intel 400 Series Chipset
Intel C230 series chipset
Intel C240 Series Chipset
Intel C250 Series Chipset
Intel C420 Chipset
Intel C620 Series Chipset
Intel C620A Series Chipset
Intel Core i5 L16G7
Intel Core i3 L13G4
Intel Pentium Processor J4000 Series
Intel Pentium Processor N4000 Series
Intel Pentium Silver J5000 Processor
Intel Pentium Silver N5000 Processors
Intel X299 Chipset
Intel Xeon D Processor 2000 Series
Intel Xeon W Processor 1300 Series
Intel Pentium Gold Processor Series
Pentium Gold processor series (G54XXU)
Intel Pentium Processor Silver Series
Intel Pentium Processor J Series
Intel Pentium Processor N Series
Software vendor:
Intel

Description

The vulnerability allows an attacker to bypass implemented security restrictions.

The vulnerability exists due to hardware debug modes and processor INIT setting allow to override of locks for some Intel Processors in Intel Boot Guard and Intel Trusted Execution Technology. An unauthenticated attacker with physical access to the system can bypass implemented security restrictions and escalate privileges on the system.

The vulnerability can be also exploited remotely by an authenticated attacker on the local network.


Remediation

Install updates from vendor's website.

External links