Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-2201

Опубликовано: 09 апр. 2024
Источник: msrc
CVSS3: 4.7
EPSS Низкий

Описание

Intel: CVE-2024-2201 Branch History Injection

This CVE was assigned by Intel. Please see CVE-2024-2201 on CVE.org for more information.

FAQ

Why is this Intel CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability is disabled by default and manual action is required for customers to be protected. This CVE is being documented in the Security Update Guide to inform customers of the available mitigation and its potential performance impact.

Please see the following for more information:

What steps are required to protect my system against the vulnerability?

We are providing the following registry information to enable the mitigations for this CVE.

Important: This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry see How to back up and restore the registry in Windows.

To enable the mitigation for CVE-2024-2201 on Windows devices and clients using Intel Processors:

  • reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x00800000 /f

  • reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 0x00000003 /f

Customers who wish to implement the mitigation within their systems can also refer to the following for more information.

To enable the mitigation for CVE-2024-2201 on Linux devices and clients using Intel Processors:

Can I expect any performance impact after I configure the registry keys?

In some cases, installing these updates will have a performance impact. In testing Microsoft has seen some performance impact with this mitigation. Microsoft values the security of its software and services but made the decision to allow users and administrators to evaluate the performance impact and risk exposure before deciding to enable the mitigation.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)

Показывать по

Дополнительная информация

    Системы:
    Windows 10 Version 21H2 for 32-bit Systems
    Windows 10 Version 21H2 for ARM64-based Systems
    Windows 10 Version 21H2 for x64-based Systems
    Windows 10 Version 22H2 for x64-based Systems
    Windows 10 Version 22H2 for ARM64-based Systems
    Windows 10 Version 22H2 for 32-bit Systems
    Ссылка:
  • https://support.microsoft.com/help/5036892
  • Системы:
    Windows Server 2008 for 32-bit Systems Service Pack 2
    Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
    Windows Server 2008 for x64-based Systems Service Pack 2
    Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
    Ссылка:
  • https://support.microsoft.com/help/5036932
  • Системы:
    Windows Server 2008 for 32-bit Systems Service Pack 2
    Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
    Windows Server 2008 for x64-based Systems Service Pack 2
    Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
    Ссылка:
  • https://support.microsoft.com/help/5036950

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 5%
0.00023
Низкий

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
ubuntu
6 месяцев назад

A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.

CVSS3: 4.7
redhat
около 1 года назад

A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.

CVSS3: 4.7
nvd
6 месяцев назад

A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.

CVSS3: 4.7
debian
6 месяцев назад

A cross-privilege Spectre v2 vulnerability allows attackers to bypass ...

CVSS3: 4.7
github
6 месяцев назад

A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.

EPSS

Процентиль: 5%
0.00023
Низкий

4.7 Medium

CVSS3