CVE-2023-28746 — Information Exposure through Microarchitectural State after Transient Execution in Intel-microcode
Severity
6.5MEDIUMNVD
OSV6.1
EPSS
0.1%
top 84.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 14
Latest updateMay 29
Description
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 2.0 | Impact: 4.0
Affected Packages20 packages
🔴Vulnerability Details
3OSV▶
CVE-2023-28746: Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allo↗2024-03-14
GHSA▶
GHSA-36c8-x5g7-w9x4: Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allo↗2024-03-14
📋Vendor Advisories
4Debian▶
CVE-2023-28746: intel-microcode - Information exposure through microarchitectural state after transient execution ...↗2023
🕵️Threat Intelligence
5💬Community
1Bugzilla
▶