Vulnerability Description
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intel | Celeron 1000M | - |
| Intel | Celeron 1005M | - |
| Intel | Celeron 1007U | - |
| Intel | Celeron 1017U | - |
| Intel | Celeron 1019Y | - |
| Intel | Celeron 1020E | - |
| Intel | Celeron 1020M | - |
| Intel | Celeron 1037U | - |
| Intel | Celeron 1047Ue | - |
| Intel | Celeron 2955U | - |
| Intel | Celeron 2957U | - |
| Intel | Celeron 2970M | - |
| Intel | Celeron 2980U | - |
| Intel | Celeron 2981U | - |
| Intel | Celeron 3755U | - |
| Intel | Celeron 3765U | - |
| Intel | Celeron 3855U | - |
| Intel | Celeron 3865U | - |
| Intel | Celeron 3955U | - |
| Intel | Celeron 3965U | - |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/07/14/5Mailing ListThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdfThird Party Advisory
- https://kc.mcafee.com/corporate/index?page=content&id=SB10318Third Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://usn.ubuntu.com/4385-1/Third Party Advisory
- https://usn.ubuntu.com/4387-1/Third Party Advisory
- https://usn.ubuntu.com/4388-1/Third Party Advisory
- https://usn.ubuntu.com/4389-1/Third Party Advisory
- https://usn.ubuntu.com/4390-1/Third Party Advisory
FAQ
What is CVE-2020-0543?
CVE-2020-0543 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
How severe is CVE-2020-0543?
CVE-2020-0543 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-0543?
Check the references section above for vendor advisories and patch information. Affected products include: Intel Celeron 1000M, Intel Celeron 1005M, Intel Celeron 1007U, Intel Celeron 1017U, Intel Celeron 1019Y.