Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
References
Configurations
No configuration.
History
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Mar 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Mar 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
14 Mar 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-14 17:15
Updated : 2024-06-25 23:15
NVD link : CVE-2023-28746
Mitre link : CVE-2023-28746
CVE.ORG link : CVE-2023-28746
JSON object : View
Products Affected
No product.
CWE
CWE-1342
Information Exposure through Microarchitectural State after Transient Execution