Medium severity6.5NVD Advisory· Published Mar 14, 2024· Updated May 12, 2026
CVE-2023-28746
CVE-2023-28746
Description
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- www.openwall.com/lists/oss-security/2024/03/12/13nvd
- xenbits.xen.org/xsa/advisory-452.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-265688.htmlnvd
- lists.debian.org/debian-lts-announce/2024/05/msg00003.htmlnvd
- lists.debian.org/debian-lts-announce/2024/06/msg00017.htmlnvd
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/nvd
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/nvd
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/nvd
- www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.htmlnvd
News mentions
0No linked articles in our index yet.