Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2021/dsa-4934 | Third Party Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2021/dsa-4934 | Third Party Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4934 - Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html - Vendor Advisory |
22 Apr 2022, 16:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_et_200sp_open_controller:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_et_200sp_open_controller_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_drive_controller_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_drive_controller:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:* |
|
References |
|
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html - Mailing List, Third Party Advisory |
10 Aug 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Jul 2021, 20:13
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 6.5 |
References |
|
|
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html - Vendor Advisory | |
CPE | cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x5-a3950:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:* cpe:2.3:h:intel:p5962b:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x5-a3930:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x5-a3960:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:* cpe:2.3:h:intel:p5921b:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x5-a3940:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3558rc:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:p5931b:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo |
09 Jun 2021, 19:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-09 19:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24513
Mitre link : CVE-2020-24513
CVE.ORG link : CVE-2020-24513
JSON object : View
Products Affected
intel
- celeron_n4100
- celeron_j3355
- atom_c3830
- atom_x6211e
- atom_x6425e
- atom_c3558
- celeron_j6413
- atom_x5-a3930
- atom_x6200fe
- pentium_silver_n5030
- celeron_j4005
- celeron_n3350e
- atom_x6413e
- atom_c3808
- atom_c3338
- atom_x5-a3960
- celeron_j3455
- atom_c3758r
- celeron_n3350
- atom_x5-a3950
- atom_c3708
- celeron_j4125
- atom_c3338r
- atom_x6427fe
- atom_c3850
- atom_c3308
- pentium_j6425
- core_i5-l16g7
- celeron_n4120
- pentium_n6415
- pentium_silver_n5000
- atom_c3508
- celeron_n4000
- celeron_n3450
- atom_p5942b
- atom_c3858
- celeron_j4025
- pentium_j4205
- p5931b
- celeron_n4020
- celeron_j3455e
- celeron_j4105
- atom_c3558rc
- atom_c3558r
- celeron_n6211
- atom_c3958
- atom_c3436l
- celeron_j3355e
- atom_c3950
- atom_x6212re
- core_i3-l13g4
- p5921b
- atom_c3758
- pentium_n4200
- pentium_silver_j5005
- pentium_silver_j5040
- p5962b
- atom_c3538
- atom_x6425re
- pentium_n4200e
- atom_c3336
- atom_c3750
- atom_x5-a3940
- atom_c3955
debian
- debian_linux
siemens
- simatic_drive_controller_firmware
- simatic_et_200sp_open_controller_firmware
- simatic_drive_controller
- simatic_et_200sp_open_controller
- simatic_ipc127e
- simatic_ipc127e_firmware
CWE