### [CVE-2023-23583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23583) ![](https://img.shields.io/static/v1?label=Product&message=Intel(R)%20Processors&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20See%20references%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Sequence%20of%20processor%20instructions%20leads%20to%20unexpected%20behavior&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=information%20disclosure%2C%20escalation%20of%20privilege%2C%20denial%20of%20service&color=brighgreen) ### Description Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access. ### POC #### Reference No PoCs from references. #### Github - https://github.com/EGI-Federation/SVG-advisories - https://github.com/Mav3r1ck0x1/CVE-2023-23583-Reptar- - https://github.com/blazcode/INTEL-SA-00950 - https://github.com/giterlizzi/secdb-feeds - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/speed47/spectre-meltdown-checker