{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2023-28746","assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","state":"PUBLISHED","assignerShortName":"intel","dateReserved":"2023-05-05T03:00:03.623Z","datePublished":"2024-03-14T16:45:50.370Z","dateUpdated":"2026-05-12T10:52:19.004Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel","dateUpdated":"2024-06-25T22:08:21.946Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"information disclosure"},{"lang":"en","description":"Information exposure through microarchitectural state after transient execution from some register files","cweId":"CWE-1342","type":"CWE"}]}],"affected":[{"vendor":"n/a","product":"Intel(R) Atom(R) Processors","versions":[{"version":"See references","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."}],"references":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/"},{"url":"http://www.openwall.com/lists/oss-security/2024/03/12/13"},{"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}}]},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-28746","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-03-14T18:58:08.088339Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:28:56.120Z"}},{"title":"CVE Program Container","references":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/","tags":["x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2024/03/12/13","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","tags":["x_transferred"]},{"url":"http://xenbits.xen.org/xsa/advisory-452.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-04-26T20:03:13.216Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T10:52:19.004Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"}]}]},"dataVersion":"5.2"}