First published: Tue Mar 12 2024(Updated: )
Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/intel-microcode | <3.20240514.0ubuntu0.18.04.1+ | 3.20240514.0ubuntu0.18.04.1+ |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.20.04.1 | 3.20240514.0ubuntu0.20.04.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.22.04.1 | 3.20240514.0ubuntu0.22.04.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.23.10.1 | 3.20240514.0ubuntu0.23.10.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.16.04.1+ | 3.20240514.0ubuntu0.16.04.1+ |
debian/intel-microcode | <=3.20231114.1~deb11u1<=3.20231114.1~deb12u1 | 3.20240514.1~deb11u1 3.20240514.1~deb12u1 3.20240813.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-43490 is rated as high due to the potential for information disclosure by a privileged user.
To fix CVE-2023-43490, update the Intel microcode to the recommended versions provided by your Linux distribution.
CVE-2023-43490 affects some Intel Xeon D Processors that utilize Intel SGX microcode on specific Ubuntu and Debian versions.
CVE-2023-43490 requires local access for exploitation, making it a local privilege escalation vulnerability.
There are no known workarounds for CVE-2023-43490; the only mitigation is to apply the necessary microcode updates.