CVE-2024-28956Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution in Intel-microcode

Severity
5.7MEDIUMNVD
EPSS
0.2%
top 54.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 13
Latest updateMay 27

Description

Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS vector

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Packages6 packages

debiandebian/intel-microcode< intel-microcode 3.20250512.1~deb12u1 (bookworm)
debiandebian/xen< intel-microcode 3.20250512.1~deb12u1 (bookworm)
debiandebian/linux< intel-microcode 3.20250512.1~deb12u1 (bookworm)
debiandebian/linux-6.1< intel-microcode 3.20250512.1~deb12u1 (bookworm)
Debianxen/xen< 4.17.5+72-g01140da4e8-1+2

🔴Vulnerability Details

3
OSV
intel-microcode vulnerabilities2025-05-27
OSV
CVE-2024-28956: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authent2025-05-13
GHSA
GHSA-hwrg-xmjh-93xc: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authent2025-05-13

📋Vendor Advisories

3
Ubuntu
Intel Microcode vulnerabilities2025-05-27
Red Hat
microcode_ctl: From CVEorg collector2025-05-13
Debian
CVE-2024-28956: intel-microcode - Exposure of Sensitive Information in Shared Microarchitectural Structures during...2024