Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23583

CVSS 8.8 · High EPSS 0.28% · P51
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-23583

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Intel Processors 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Intel Processors(英特尔处理器)是美国英特尔(Intel)公司的提供解释计算机指令以及处理计算机软件中的数据。 Intel Processors存在安全漏洞,该漏洞源于处理器指令序列会导致某些英特尔处理器出现意外行为,攻击者利用该漏洞可以通过本地访问实现特权升级、信息泄露或拒绝服务,以下产品和版本受到影响:10th Generation Intel Core Processor Family(Mobile)、3rd Generation Intel Xeon Processor Scala
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Intel(R) Processors See references -

II. Public POCs for CVE-2023-23583

#POC DescriptionSource LinkShenlong Link
1This script can help determine the CPU ID for the processor of your system, please note that I have not added every CPU ID to this script, edit as needed.https://github.com/Mav3r1ck0x1/CVE-2023-23583-Reptar-POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-23583

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-11-14 · 129 CVEs total

CVE-2023-3127310.0 CRITICALIntel DCM software 安全漏洞
CVE-2023-287378.8 HIGHIntel NUC Software 安全漏洞
CVE-2023-322048.8 HIGHIntel One Boot Flash Utility 安全漏洞
CVE-2023-291578.4 HIGHIntel OFU software 安全漏洞
CVE-2022-339458.2 HIGHIntel Server Board 安全漏洞
CVE-2022-363968.2 HIGHIntel NUC 安全漏洞
CVE-2023-344318.2 HIGHIntel Server Board 安全漏洞
CVE-2023-287417.9 HIGHIntel QuickAssist Technology 安全漏洞
CVE-2022-292627.9 HIGHIntel Server Board 安全漏洞
CVE-2023-283977.8 HIGHIntel NUC 安全漏洞
CVE-2023-368607.6 HIGHIntel Unison 安全漏洞
CVE-2023-223377.5 HIGHIntel Unison 安全漏洞
CVE-2023-222857.5 HIGHIntel Unison 安全漏洞
CVE-2023-322797.5 HIGHIntel Wireless Products 安全漏洞
CVE-2022-243797.5 HIGHIntel Server Board 和 Server System BIOS firmware 安全漏洞
CVE-2022-363747.5 HIGHIntel NUC Software 安全漏洞
CVE-2022-295107.5 HIGHIntel Server Board 安全漏洞
CVE-2023-222927.3 HIGHIntel Unison 安全漏洞
CVE-2023-326417.3 HIGHIntel QuickAssist Technology 安全漏洞
CVE-2022-416897.3 HIGHIntel In-Band Manageability 安全漏洞

Showing top 20 of 129 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-23583

No comments yet


Leave a comment