Privilege Escalation Vulnerability in Intel Xeon Processors
CVE-2022-33196
7.2HIGH
Key Information:
- Vendor
- Intel
- Vendor
- CVE Published:
- 16 February 2023
Summary
This vulnerability arises from incorrect default permissions in certain memory controller configurations for specific Intel Xeon processors utilizing Intel Software Guard Extensions. A privileged user can potentially leverage local access to escalate their privileges, posing a security risk for affected systems. It is crucial for users of the affected processors to apply the necessary updates and configurations as recommended by Intel to mitigate this risk.
Affected Version(s)
Intel(R) Xeon(R) Processors with Intel® Software Guard Extensions (SGX) See references
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved