#VU65220 Processor optimization removal or modification of security-critical code in Intel products - CVE-2022-29901
Published: July 12, 2022
Vulnerability identifier: #VU65220
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-29901
CWE-ID: CWE-1037
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Intel Xeon E Processors
6th Generation Intel Core Processors
Intel Xeon D Processors
Intel Xeon W Processors
Intel Core X-series Processors
8th Generation Intel Core Processors
Intel Pentium Gold Processor Series
7th Generation Intel Core Processors
Intel Pentium Processors
Intel Celeron Processor G Series
Intel Xeon Scalable Processors
9th Generation Intel Core Processors
Intel Xeon E Processors
6th Generation Intel Core Processors
Intel Xeon D Processors
Intel Xeon W Processors
Intel Core X-series Processors
8th Generation Intel Core Processors
Intel Pentium Gold Processor Series
7th Generation Intel Core Processors
Intel Pentium Processors
Intel Celeron Processor G Series
Intel Xeon Scalable Processors
9th Generation Intel Core Processors
Software vendor:
Intel
Intel
Description
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to the way non-transparent sharing of branch predictor targets between contexts. A local user can exploit the vulnerability to gain access to sensitive information.
Remediation
Install updates from vendor's website.