Domain-bypass Transient Execution Vulnerability in Intel Atom Processors
CVE-2020-24513

6.5MEDIUM

Key Information:

Vendor
Intel
Vendor
CVE Published:
9 June 2021

Summary

Certain Intel Atom processors possess a domain-bypass transient execution vulnerability that may allow a malicious authenticated user to exploit the flaw through local access. This vulnerability could lead to potential information disclosure, posing a threat to the confidentiality of data processed by affected systems. To mitigate risks, users should monitor updates from Intel and apply relevant security patches.

Affected Version(s)

Intel Atom(R) Processors See references

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.