Severity
4.4MEDIUMNVD
EPSS
0.1%
top 79.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 10
Latest updateMay 24

Description

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploitability: 0.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/xen< xen 4.14.0+80-gd101b417b7-1 (bookworm)
Debianxen/xen< 4.14.0+80-gd101b417b7-1+3
NVDxen/xen4.14.0

Also affects: Debian Linux 10.0, Fedora 32

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hg2f-7x6w-x2hx: Xen through 42022-05-24
OSV
CVE-2020-28368: Xen through 42020-11-10

📋Vendor Advisories

2
Red Hat
xen: information leak via power sidechannel2020-11-10
Debian
CVE-2020-28368: xen - Xen through 4.14.x allows guest OS administrators to obtain sensitive informatio...2020

📐Framework References

1
CWE
Improper Protection of Physical Side Channels