CVE-2023-22655

Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.1 MEDIUM
LOCAL
HIGH
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
intelCNA
6.1 MEDIUM
LOCAL
HIGH
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
Debian logo
Debian Releases
Debian Product
Codename
intel-microcode
bullseye/non-free
3.20240813.1~deb11u1
fixed
bullseye/non-free (security)
3.20241112.1~deb11u1
fixed
bookworm/non-free-firmware
3.20240910.1~deb12u1
fixed
bookworm/non-free-firmware (security)
vulnerable
sid/non-free-firmware
3.20241112.1
fixed
trixie/non-free-firmware
3.20241112.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
intel-microcode
noble
not-affected
mantic
Fixed 3.20240514.0ubuntu0.23.10.1
released
jammy
Fixed 3.20240514.0ubuntu0.22.04.1
released
focal
Fixed 3.20240514.0ubuntu0.20.04.1
released
bionic
Fixed 3.20240514.0ubuntu0.18.04.1+esm1
released
xenial
Fixed 3.20240514.0ubuntu0.16.04.1+esm1
released
trusty
ignored