First published: Thu Nov 14 2019(Updated: )
Insufficient initialization in Intel(R) SGX SDK Windows versions 2.4.100.51291 and earlier, and Linux versions 2.6.100.51363 and earlier, may allow an authenticated user to enable information disclosure, escalation of privilege or denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Software Guard Extensions | =2.3.100.49777 | |
Intel Software Guard Extensions | =2.3.101.50222 | |
Intel Software Guard Extensions | =2.4.100.51291 | |
Microsoft Windows | ||
Intel Software Guard Extensions | =2.2.100.45311 | |
Intel Software Guard Extensions | =2.3.100.46354 | |
Intel Software Guard Extensions | =2.4.100.48163 | |
Intel Software Guard Extensions | =2.5.100.49891 | |
Intel Software Guard Extensions | =2.6.100.51363 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14565 has a high severity rating due to its potential to allow information disclosure, escalation of privilege, or denial of service.
To fix CVE-2019-14565, update the Intel SGX SDK to versions 2.4.100.51292 or later for Windows and 2.6.100.51364 or later for Linux.
CVE-2019-14565 affects users of Intel SGX SDK versions 2.4.100.51291 and earlier on Windows and versions 2.6.100.51363 and earlier on Linux.
CVE-2019-14565 requires local access by an authenticated user to exploit, thus it is not a remote vulnerability.
The potential impacts of CVE-2019-14565 include unauthorized information disclosure, privilege escalation, and denial of service.