First published: Tue Mar 12 2024(Updated: )
Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/intel-microcode | <3.20240514.0ubuntu0.18.04.1+ | 3.20240514.0ubuntu0.18.04.1+ |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.20.04.1 | 3.20240514.0ubuntu0.20.04.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.22.04.1 | 3.20240514.0ubuntu0.22.04.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.23.10.1 | 3.20240514.0ubuntu0.23.10.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.16.04.1+ | 3.20240514.0ubuntu0.16.04.1+ |
debian/intel-microcode | <=3.20231114.1~deb11u1<=3.20231114.1~deb12u1 | 3.20240514.1~deb11u1 3.20240514.1~deb12u1 3.20240813.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22655 has a high severity level due to its potential to allow escalation of privilege for privileged users.
To mitigate CVE-2023-22655, update to the latest versions of the intel-microcode package available for your specific Ubuntu or Debian release.
CVE-2023-22655 affects 3rd and 4th Generation Intel Xeon Processors utilizing Intel SGX or Intel TDX technologies.
Yes, CVE-2023-22655 allows a privileged user with local access to potentially escalate their privileges.
Versions of intel-microcode that are updated to at least 3.20240514.*, based on your OS version, are considered safe from CVE-2023-22655.