CWE
1342
Advisory Published
CVE Published
Updated

CVE-2023-28746: Fixes in impacted Intel processors

First published: Tue Mar 05 2024(Updated: )

<p>This CVE was assigned by Intel. Please see <a href="https://www.cve.org/CVERecord?id=CVE-2023-28746">CVE-2023-28746</a> on CVE.org for more information.</p>

Credit: secure@intel.com secure@intel.com

Affected SoftwareAffected VersionHow to fix
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2019
Microsoft Windows Server 2016
Microsoft Windows 11=22H2
Microsoft Windows Server 2016
Microsoft Windows 10=1809
Microsoft Windows Server 2022
Microsoft Windows Server 2019
Microsoft Windows 10=1809
Microsoft Windows Server 2012 R2
Microsoft Windows 10=1607
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows 10=22H2
Microsoft Windows 10
Microsoft Windows 10
Microsoft Windows 11=21H2
Microsoft Windows 10=22H2
Microsoft Windows 10=21H2
Microsoft Windows 11=23H2
Microsoft Windows Server 2022
Microsoft Windows 10=21H2
Microsoft Windows 10=1607
ubuntu/intel-microcode<3.20240514.0ubuntu0.18.04.1+
3.20240514.0ubuntu0.18.04.1+
ubuntu/intel-microcode<3.20240514.0ubuntu0.20.04.1
3.20240514.0ubuntu0.20.04.1
ubuntu/intel-microcode<3.20240514.0ubuntu0.22.04.1
3.20240514.0ubuntu0.22.04.1
ubuntu/intel-microcode<3.20240514.0ubuntu0.23.10.1
3.20240514.0ubuntu0.23.10.1
ubuntu/intel-microcode<3.20240514.0ubuntu0.16.04.1+
3.20240514.0ubuntu0.16.04.1+
debian/intel-microcode<=3.20231114.1~deb11u1<=3.20231114.1~deb12u1
3.20240514.1~deb11u1
3.20240514.1~deb12u1
3.20240813.2
debian/linux
5.10.218-1
5.10.223-1
6.1.94-1
6.1.99-1
6.10.6-1
debian/xen<=4.14.6-1<=4.14.5+94-ge49571868d-1<=4.17.3+10-g091466ba55-1~deb12u1<=4.17.3+36-g54dacb5c02-1
Microsoft Windows Server 2012 x64
Microsoft Windows Server 2012 x64
Microsoft Windows Server 2022 23H2
Microsoft Windows Server 2008 Itanium
Microsoft Windows Server 2008 Itanium

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Peer vulnerabilities

(Found alongside the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of CVE-2023-28746?

    CVE-2023-28746 is considered a high severity vulnerability due to the potential for information exposure through microarchitectural state after transient execution.

  • How do I fix CVE-2023-28746?

    To remediate CVE-2023-28746, apply the relevant patches provided by Microsoft and update the Intel microcode as specified for your operating system.

  • What systems are affected by CVE-2023-28746?

    CVE-2023-28746 affects various Windows Server versions, Windows 10, Windows 11, and specific versions of the Intel microcode packages.

  • Is CVE-2023-28746 being actively exploited?

    As of now, there is no public indication that CVE-2023-28746 is actively being exploited in the wild, but it is advisable to apply patches promptly.

  • What risks are associated with CVE-2023-28746?

    The primary risk of CVE-2023-28746 is unauthorized access to sensitive data, which could be exploited by attackers through transient execution techniques.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203