Vulnerability Description
Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intel | Software Guard Extensions Sdk | < 2.6.100.1 |
| Microsoft | Windows | - |
| Linux | Linux Kernel | - |
| Opensuse | Backports | sle-15 |
| Opensuse | Leap | 15.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00009.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00014.htmlMailing ListThird Party Advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00336.Vendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00009.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00014.htmlMailing ListThird Party Advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00336.Vendor Advisory
FAQ
What is CVE-2020-0561?
CVE-2020-0561 is a vulnerability with a CVSS score of 7.8 (HIGH). Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
How severe is CVE-2020-0561?
CVE-2020-0561 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-0561?
Check the references section above for vendor advisories and patch information. Affected products include: Intel Software Guard Extensions Sdk, Microsoft Windows, Linux Linux Kernel, Opensuse Backports, Opensuse Leap.