First published: Thu Mar 14 2024(Updated: )
On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Xeon Processors Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-32666 is considered a high severity vulnerability due to potential privilege escalation risks.
To fix CVE-2023-32666, apply the latest firmware updates and security patches provided by Intel.
CVE-2023-32666 affects some 4th Generation Intel Xeon Processors when utilizing Intel SGX or Intel TDX.
Privileged users with local access to affected Intel Xeon processors may be vulnerable to CVE-2023-32666.
CVE-2023-32666 may allow an attacker to escalate privileges on systems using vulnerable Intel Xeon processors.