cve/2023/CVE-2023-23583.md
2024-06-22 09:37:59 +00:00

25 lines
1.3 KiB
Markdown

### [CVE-2023-23583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23583)
![](https://img.shields.io/static/v1?label=Product&message=Intel(R)%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20See%20references%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Sequence%20of%20processor%20instructions%20leads%20to%20unexpected%20behavior&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=information%20disclosure%2C%20escalation%20of%20privilege%2C%20denial%20of%20service&color=brighgreen)
### Description
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/Mav3r1ck0x1/CVE-2023-23583-Reptar-
- https://github.com/blazcode/INTEL-SA-00950
- https://github.com/codexlynx/hardware-attacks-state-of-the-art
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/speed47/spectre-meltdown-checker