CVE-2023-23583
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/11/2023
Last modified:
07/01/2025
Description
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2023/11/14/4
- http://www.openwall.com/lists/oss-security/2023/11/14/5
- http://www.openwall.com/lists/oss-security/2023/11/14/6
- http://www.openwall.com/lists/oss-security/2023/11/14/7
- http://www.openwall.com/lists/oss-security/2023/11/14/8
- http://www.openwall.com/lists/oss-security/2023/11/14/9
- https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html
- https://security.netapp.com/advisory/ntap-20231116-0015/
- https://www.debian.org/security/2023/dsa-5563
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
- http://www.openwall.com/lists/oss-security/2023/11/14/4
- http://www.openwall.com/lists/oss-security/2023/11/14/5
- http://www.openwall.com/lists/oss-security/2023/11/14/6
- http://www.openwall.com/lists/oss-security/2023/11/14/7
- http://www.openwall.com/lists/oss-security/2023/11/14/8
- http://www.openwall.com/lists/oss-security/2023/11/14/9
- https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html
- https://security.netapp.com/advisory/ntap-20231116-0015/
- https://www.debian.org/security/2023/dsa-5563
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html



