cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-36293,https://securityvulnerability.io/vulnerability/CVE-2024-36293,Improper Access Control Vulnerability in Intel SGX-Enabled Processors,"The vulnerability arises from improper access control in the EDECCSSA user leaf function of certain Intel SGX-enabled processors. This flaw could potentially allow an authenticated user to wreak havoc by enabling a denial of service condition through local access. As a result, systems using these processors may become unresponsive or experience degradation in performance. It's crucial for users to be aware of this vulnerability and to apply any patches or mitigations recommended by Intel to protect their systems.",Intel,Intel(r) Processors With Intel(r) Sgx,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:12.658Z,0 CVE-2023-43753,https://securityvulnerability.io/vulnerability/CVE-2023-43753,Potential Information Disclosure Vulnerability in Intel Processors with SGX,"An improper conditions check in Intel's Software Guard Extensions (SGX) on certain processors may permit a privileged user to potentially disclose sensitive information through local access. This vulnerability underscores the importance of thorough security measures and monitoring in environments leveraging SGX technology, as it could expose critical data if exploited. For comprehensive information and remediation recommendations, consult Intel's advisory on this matter.",Intel,Intel(r) Processors With Intel(r) Sgx,5.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T16:38:46.373Z,0 CVE-2023-22655,https://securityvulnerability.io/vulnerability/CVE-2023-22655,Potential Escalation of Privilege Vulnerability Affecting Intel Processors,"A protection mechanism failure has been identified in certain 3rd and 4th Generation Intel Xeon Processors when utilizing Intel SGX or Intel TDX. This flaw allows users with privileged access to potentially escalate their privileges through local access. As a result, this could lead to unauthorized access to sensitive information or critical resources within an affected system. System administrators and users operating with these processor generations should be vigilant and consider applying updates or mitigations provided by Intel and other affiliated security advisories.",Intel,3rd And 4th Generation Intel(r) Xeon(r) Processors When Using Intel(r) Sgx Or Intel(r) Tdx,6.1,MEDIUM,0.001290000043809414,false,,false,false,false,,,false,false,,2024-03-14T16:45:46.683Z,0 CVE-2023-32666,https://securityvulnerability.io/vulnerability/CVE-2023-32666,Potential Escalation of Privilege via Local Access in Intel(R) SGX or Intel(R) TDX,"The vulnerability allows a privileged user to exploit improper access control in the on-chip debug and test interfaces of specific 4th Generation Intel Xeon Processors. When utilizing Intel Software Guard Extensions (SGX) or Intel Trusted Execution Technology (TDX), this flaw could potentially lead to escalation of privileges through local access. This situation poses a significant security risk, highlighting the importance of monitoring and securing access to sensitive system resources.",Intel,4th Generation Intel(r) Xeon(r) Processors When Using Intel(r) Sgx Or Intel(r) Tdx,7.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-14T16:45:44.785Z,0 CVE-2023-43490,https://securityvulnerability.io/vulnerability/CVE-2023-43490,Potential Information Disclosure Vulnerability in Intel Xeon D Processors with Intel SGX,A vulnerability exists in some Intel Xeon D processors that utilize Intel Software Guard Extensions (SGX) due to an incorrect calculation in the microcode keying mechanism. This flaw may allow a privileged user with local access to enable the disclosure of sensitive information. The potential for exploited access underscores the need for immediate security measures to protect against unauthorized information retrieval. Users of affected processors should refer to Intel's security advisory for detailed guidance on mitigation.,Intel,Intel(r) Xeon(r) D Processors With Intel(r) Sgx,5.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-03-14T16:45:44.079Z,0 CVE-2022-38090,https://securityvulnerability.io/vulnerability/CVE-2022-38090,Improper Isolation Vulnerability in Intel Processors with Software Guard Extensions,"This vulnerability arises from improper isolation of shared resources in certain Intel processors when utilizing Intel Software Guard Extensions (SGX). A privileged user could exploit this flaw to potentially disclose sensitive information through local access, posing privacy risks and security concerns for affected systems. It underscores the necessity for robust security measures to prevent unauthorized access and maintain data integrity.",Intel,Intel(r) Processors With Intel(r) Software Guard Extensions (sgx),4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:29.274Z,0 CVE-2022-33196,https://securityvulnerability.io/vulnerability/CVE-2022-33196,Privilege Escalation Vulnerability in Intel Xeon Processors,"This vulnerability arises from incorrect default permissions in certain memory controller configurations for specific Intel Xeon processors utilizing Intel Software Guard Extensions. A privileged user can potentially leverage local access to escalate their privileges, posing a security risk for affected systems. It is crucial for users of the affected processors to apply the necessary updates and configurations as recommended by Intel to mitigate this risk.",Intel,Intel(r) Xeon(r) Processors With Intelâ® Software Guard Extensions (sgx),7.2,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:22.704Z,0 CVE-2022-0005,https://securityvulnerability.io/vulnerability/CVE-2022-0005,Information Disclosure Vulnerability in Intel Processors with SGX,A physical probing of the JTAG interface on specific Intel processors featuring Software Guard Extensions (SGX) could allow an unprivileged user to access sensitive information. This vulnerability highlights the risks associated with physical access to hardware and demonstrates the necessity for enhanced physical security measures to prevent unauthorized disclosure of data.,Intel,Intel(r) Processors With Sgx,2.4,LOW,0.0005799999926239252,false,,false,false,false,,,false,false,,2022-05-12T16:36:04.000Z,0 CVE-2021-0186,https://securityvulnerability.io/vulnerability/CVE-2021-0186,Improper Input Validation in Intel SGX SDK Applications for SGX2 Processors,"Improper input validation in the Intel SGX SDK applications compiled for SGX2 enabled processors can potentially allow a privileged user to escalate privileges via local access. This vulnerability poses a significant risk as it may enable attackers to execute unauthorized actions within sensitive environments, using local access to exploit this flaw.",Intel,Intel(r) Sgx Sdk Applications Compiled For Sgx2 Enabled Processors,6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-11-17T19:45:47.000Z,0 CVE-2020-24491,https://securityvulnerability.io/vulnerability/CVE-2020-24491,Information Disclosure Vulnerability in Intel 10th Generation Core Processors,"An information disclosure vulnerability exists in certain Intel 10th Generation Core Processors that support Intel Software Guard Extensions (SGX). This vulnerability arises due to debug messages that expose the addresses of memory transactions. A local privileged user could potentially exploit this weakness to gain unauthorized access to sensitive information, thereby increasing the risk of data exposure.",Intel,Intel(r) 10th Generation Core Processors Supporting Sgx,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-02-17T13:44:03.000Z,0 CVE-2019-0117,https://securityvulnerability.io/vulnerability/CVE-2019-0117,Insufficient Access Control in Protected Memory Subsystem for Intel Processors,"The vulnerability arises from insufficient access control within the protected memory subsystem of Intel's Software Guard Extensions (SGX). This flaw affects a range of Intel Core and Xeon processors, potentially allowing a privileged user to exploit local access and enable unauthorized information disclosure. This poses significant risks to data security in environments utilizing said processors.",Intel,2019.2 Ipu – Intel(r) Sgx With Intel(r) Processor Graphics Update,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-11-14T19:08:20.000Z,0