cve/2022/CVE-2022-40982.md

26 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-40982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982)
![](https://img.shields.io/static/v1?label=Product&message=Intel(R)%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20See%20references%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20exposure%20through%20microarchitectural%20state%20after%20transient%20execution&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=information%20disclosure&color=brighgreen)
### Description
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
### POC
#### Reference
- https://downfall.page
#### Github
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/bcoles/kasld
2024-06-22 09:37:59 +00:00
- https://github.com/codexlynx/hardware-attacks-state-of-the-art
2024-05-25 21:48:12 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/hughsie/python-uswid
- https://github.com/rosvik/cve-import
- https://github.com/speed47/spectre-meltdown-checker