CVE-2020-24513

Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3558rc:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-a3930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-a3940:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-a3950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-a3960:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:p5921b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:p5931b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:p5962b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:simatic_drive_controller_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_drive_controller:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:simatic_et_200sp_open_controller_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_et_200sp_open_controller:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*

History

22 Apr 2022, 16:20

Type Values Removed Values Added
First Time Siemens simatic Ipc127e
Siemens
Siemens simatic Drive Controller Firmware
Siemens simatic Et 200sp Open Controller
Siemens simatic Et 200sp Open Controller Firmware
Siemens simatic Ipc127e Firmware
Siemens simatic Drive Controller
CPE cpe:2.3:h:siemens:simatic_drive_controller:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_drive_controller_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_et_200sp_open_controller:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_et_200sp_open_controller_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
References
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html - Mailing List, Third Party Advisory

10 Aug 2021, 12:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html -

01 Jul 2021, 20:13

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 6.5
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4934 - Third Party Advisory
References (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html - (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html - Vendor Advisory
CWE NVD-CWE-noinfo
CPE cpe:2.3:h:intel:atom_x5-a3940:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:p5962b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-a3960:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3558rc:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-a3950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:p5921b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:p5931b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-a3930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*

09 Jun 2021, 19:22

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-09 19:15

Updated : 2023-12-10 13:55


NVD link : CVE-2020-24513

Mitre link : CVE-2020-24513

CVE.ORG link : CVE-2020-24513


JSON object : View

Products Affected

intel

  • celeron_j6413
  • p5921b
  • atom_c3436l
  • atom_c3750
  • celeron_j3455
  • p5962b
  • atom_c3808
  • atom_x6425e
  • atom_c3508
  • celeron_n3350e
  • atom_c3955
  • pentium_silver_j5005
  • atom_c3336
  • celeron_n3350
  • celeron_n4100
  • atom_c3958
  • atom_c3558
  • atom_c3850
  • atom_p5942b
  • pentium_j4205
  • pentium_silver_n5000
  • atom_c3758r
  • atom_x5-a3940
  • atom_c3758
  • p5931b
  • pentium_j6425
  • celeron_n4020
  • atom_c3950
  • atom_c3708
  • atom_c3338
  • celeron_j4125
  • atom_c3858
  • atom_x6200fe
  • atom_x6211e
  • pentium_silver_n5030
  • atom_x5-a3930
  • celeron_j3455e
  • celeron_n4000
  • atom_x5-a3950
  • atom_x6425re
  • pentium_n4200e
  • celeron_j4105
  • pentium_n4200
  • pentium_silver_j5040
  • celeron_j4025
  • atom_c3338r
  • celeron_n6211
  • celeron_j3355e
  • atom_c3558rc
  • atom_c3830
  • atom_x5-a3960
  • atom_x6427fe
  • pentium_n6415
  • celeron_j4005
  • celeron_n3450
  • atom_c3308
  • atom_c3538
  • celeron_j3355
  • core_i3-l13g4
  • atom_x6413e
  • atom_x6212re
  • atom_c3558r
  • celeron_n4120
  • core_i5-l16g7

siemens

  • simatic_et_200sp_open_controller
  • simatic_drive_controller
  • simatic_ipc127e_firmware
  • simatic_ipc127e
  • simatic_drive_controller_firmware
  • simatic_et_200sp_open_controller_firmware

debian

  • debian_linux