CVE-2022-33196Incorrect Default Permissions in Intel-microcode

Severity
6.7MEDIUMNVD
OSV6.8
EPSS
0.0%
top 89.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 16
Latest updateFeb 27

Description

Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages1 packages

debiandebian/intel-microcode< intel-microcode 3.20230214.1 (bookworm)

🔴Vulnerability Details

3
OSV
intel-microcode vulnerabilities2023-02-27
OSV
CVE-2022-33196: Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensi2023-02-16
GHSA
GHSA-p934-6v76-mvww: Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensi2023-02-16

📋Vendor Advisories

3
Ubuntu
Intel Microcode vulnerabilities2023-02-27
Red Hat
kernel: Intel firmware update for Incorrect default permissions in some memory controller configurations2023-02-16
Debian
CVE-2022-33196: intel-microcode - Incorrect default permissions in some memory controller configurations for some ...2022