#VU60491 Information disclosure in Intel products - CVE-2021-0145

 

#VU60491 Information disclosure in Intel products - CVE-2021-0145

Published: February 10, 2022


Vulnerability identifier: #VU60491
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-0145
CWE-ID: CWE-200
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Intel Core X-series Processors
Intel Xeon E Processors
Intel Atom Processor X Series
6th Generation Intel Core Processors
Intel Xeon D Processors
Intel Xeon W Processors
2nd Generation Intel Xeon Scalable Processors
Intel Core X-series Processor
3rd Generation Intel Xeon Scalable Processors
Intel Atom Processors
Intel Celeron Processor J Series
Intel Celeron Processor N Series
Intel Atom Processor A Series
Intel Atom Processor C Series
Intel Puma 7 Family
Intel Pentium Processor Silver Series
10th Generation Intel Core Processors
Intel Core Processors with Intel Hybrid Technology
11th Generation Intel Core Processors
Intel Xeon Processors
Intel Celeron Processors
8th Generation Intel Core Processors
2th Generation Intel Core Processor Family
3th Generation Intel Core Processor Family
4th Generation Intel Core Processor Family
7th Generation Intel Core Processors
Intel Pentium Gold Processor Series
Intel Celeron Processor 5000 Series
12th Generation Intel Core Processors
Intel Pentium Processors
Intel Celeron Processor G Series
Intel Xeon E-2300 processor family
Intel Xeon W-1300 Processor Family
Intel Xeon Scalable Processors
Intel Pentium Processor J Series
Intel Pentium Processor N Series
Intel Atom Processor E3900 Series
9th Generation Intel Core Processors
Software vendor:
Intel

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to improper initialization of shared resources. A local user can gain unauthorized access to sensitive information on the system.


Remediation

Install updates from vendor's website.

External links