{"containers":{"cna":{"affected":[{"product":"Intel Atom(R) Processors","vendor":"n/a","versions":[{"status":"affected","version":"See references"}]}],"descriptions":[{"lang":"en","value":"Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access."}],"problemTypes":[{"descriptions":[{"description":" information disclosure or cause denial of service ","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-02-09T22:04:42.000Z","orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","ID":"CVE-2021-33120","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Intel Atom(R) Processors","version":{"version_data":[{"version_value":"See references"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":" information disclosure or cause denial of service "}]}]},"references":{"reference_data":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html","refsource":"MISC","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T23:42:19.859Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-125","lang":"en","description":"CWE-125 Out-of-bounds Read"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.4,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"LOW","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T13:21:22.594244Z","id":"CVE-2021-33120","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-05T16:49:25.748Z"}}]},"cveMetadata":{"assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","assignerShortName":"intel","cveId":"CVE-2021-33120","datePublished":"2022-02-09T22:04:42.000Z","dateReserved":"2021-05-18T00:00:00.000Z","dateUpdated":"2025-05-05T16:49:25.748Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}