First published: Thu Feb 13 2020(Updated: )
Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
<2.6.100.1 | ||
Microsoft Windows | ||
<2.8.100.1 | ||
Linux Linux kernel | ||
Opensuse Backports | =sle-15-sp1 | |
openSUSE Leap | =15.1 | |
All of | ||
Intel Software Guard Extensions Sdk | <2.6.100.1 | |
Microsoft Windows | ||
All of | ||
Intel Software Guard Extensions Sdk | <2.8.100.1 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-0561 is a vulnerability that allows an authenticated user to potentially enable escalation of privilege via local access.
CVE-2020-0561 affects Intel Software Guard Extensions SDK versions up to 2.6.100.1 and 2.8.100.1.
No, Microsoft Windows is not affected by CVE-2020-0561.
No, Linux Linux kernel is not affected by CVE-2020-0561.
OpenSUSE Backports version sle-15-sp1 and openSUSE Leap version 15.1 are affected by CVE-2020-0561.
CVE-2020-0561 has a severity value of 7.8 (high).
The CWE ID for CVE-2020-0561 is 665.
To fix CVE-2020-0561, update your Intel Software Guard Extensions SDK to version 2.6.100.1 or higher.