MEDIUM · 6.5

CVE-2022-40982

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable inf...

Vulnerability Description

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
RedhatEnterprise Linux6.0
XenXen-
IntelMicrocode< 20230808
IntelCeleron 5205U-
IntelCeleron 5305U-
IntelCeleron G4900-
IntelCeleron G4900T-
IntelCeleron G4920-
IntelCeleron G5900-
IntelCeleron G5900T-
IntelCeleron G5905-
IntelCeleron G5905T-
IntelCeleron G5920-
IntelCeleron G5925-
IntelCore I3-1000G1-
IntelCore I3-1000G4-
IntelCore I3-1005G1-
IntelCore I3-10100-
IntelCore I3-10100F-
IntelCore I3-10100T-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-40982?

CVE-2022-40982 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable inf...

How severe is CVE-2022-40982?

CVE-2022-40982 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-40982?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux, Xen Xen, Intel Microcode, Intel Celeron 5205U, Intel Celeron 5305U.