cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-27457,https://securityvulnerability.io/vulnerability/CVE-2024-27457,Potential Information Disclosure Vulnerability in Intel TDX Module Firmware,Improper check for unusual or exceptional conditions in Intel(R) TDX Module firmware before version 1.5.06 may allow a privileged user to potentially enable information disclosure via local access.,Intel,Intel(r) Tdx Module Firmware,2.5,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-08T18:43:16.361Z,0 CVE-2024-39283,https://securityvulnerability.io/vulnerability/CVE-2024-39283,Possible Escalation of Privilege via Local Access in Intel TDX Module Software,"The Intel TDX module software, prior to version TDX_1.5.01.00.592, exhibits an incomplete filtering issue regarding special elements. This vulnerability may permit an authenticated user to potentially achieve privilege escalation through local access, thereby compromising system security. It is critical for users of affected versions to address this issue to mitigate potential risks associated with unauthorized access and control.",Intel,Intel(r) Tdx Module Software,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:39.501Z,0 CVE-2024-21801,https://securityvulnerability.io/vulnerability/CVE-2024-21801,Potential Denial of Service Vulnerability in Intel TDX Module Software,"The vulnerability associated with the Intel TDX module software arises from insufficient control flow management. This issue can potentially allow a privileged user local access to the system, enabling them to create a denial of service condition. Affected versions prior to 1.5.05.46.698 are susceptible, emphasizing the importance of timely updates to ensure robust security. For further details, refer to the advisory at Intel's security center.",Intel,Intel(r) Tdx Module Software,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:36.610Z,0 CVE-2023-47855,https://securityvulnerability.io/vulnerability/CVE-2023-47855,Potential Escalation of Privilege Vulnerability in Intel TDX Module Software,Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.,Intel,Intel(r) Tdx Module Software,6,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:25.146Z,0 CVE-2023-45745,https://securityvulnerability.io/vulnerability/CVE-2023-45745,Potential Escalation of Privilege Vulnerability in Intel TDX Module Software,"A vulnerability exists in certain versions of Intel(R) TDX module software due to improper input validation. This flaw may permit a privileged user with local access to exploit the issue and potentially escalate their privileges. The affected versions include those prior to version 1.5.05.46.698, which users should be aware of to safeguard their systems.",Intel,Intel(r) Tdx Module Software,7.9,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:24.558Z,0 CVE-2023-22655,https://securityvulnerability.io/vulnerability/CVE-2023-22655,Potential Escalation of Privilege Vulnerability Affecting Intel Processors,"A protection mechanism failure has been identified in certain 3rd and 4th Generation Intel Xeon Processors when utilizing Intel SGX or Intel TDX. This flaw allows users with privileged access to potentially escalate their privileges through local access. As a result, this could lead to unauthorized access to sensitive information or critical resources within an affected system. System administrators and users operating with these processor generations should be vigilant and consider applying updates or mitigations provided by Intel and other affiliated security advisories.",Intel,3rd And 4th Generation Intel(r) Xeon(r) Processors When Using Intel(r) Sgx Or Intel(r) Tdx,6.1,MEDIUM,0.001290000043809414,false,,false,false,false,,,false,false,,2024-03-14T16:45:46.683Z,0 CVE-2023-32666,https://securityvulnerability.io/vulnerability/CVE-2023-32666,Potential Escalation of Privilege via Local Access in Intel(R) SGX or Intel(R) TDX,"The vulnerability allows a privileged user to exploit improper access control in the on-chip debug and test interfaces of specific 4th Generation Intel Xeon Processors. When utilizing Intel Software Guard Extensions (SGX) or Intel Trusted Execution Technology (TDX), this flaw could potentially lead to escalation of privileges through local access. This situation poses a significant security risk, highlighting the importance of monitoring and securing access to sensitive system resources.",Intel,4th Generation Intel(r) Xeon(r) Processors When Using Intel(r) Sgx Or Intel(r) Tdx,7.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-14T16:45:44.785Z,0