cve/2022/CVE-2022-40982.md

25 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-40982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982)
![](https://img.shields.io/static/v1?label=Product&message=Intel(R)%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20See%20references%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20exposure%20through%20microarchitectural%20state%20after%20transient%20execution&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=information%20disclosure&color=brighgreen)
### Description
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
### POC
#### Reference
- https://downfall.page
#### Github
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/bcoles/kasld
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/hughsie/python-uswid
- https://github.com/rosvik/cve-import
- https://github.com/speed47/spectre-meltdown-checker