Potential Escalation of Privilege via Local Access in Intel(R) SGX or Intel(R) TDX
CVE-2023-32666
Key Information:
- Vendor
Intel
- Vendor
- CVE Published:
- 14 March 2024
What is CVE-2023-32666?
The vulnerability allows a privileged user to exploit improper access control in the on-chip debug and test interfaces of specific 4th Generation Intel Xeon Processors. When utilizing Intel Software Guard Extensions (SGX) or Intel Trusted Execution Technology (TDX), this flaw could potentially lead to escalation of privileges through local access. This situation poses a significant security risk, highlighting the importance of monitoring and securing access to sensitive system resources.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved