CVE-2020-24513

Summary

CVECVE-2020-24513
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-06-09 19:15:00 UTC
Updated2022-04-22 16:20:00 UTC
DescriptionDomain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 10.0 All All All
Operating System Debian Debian Linux 9.0 All All All
Hardware Intel Atom C3308 - All All All
Hardware Intel Atom C3336 - All All All
Hardware Intel Atom C3338 - All All All
Hardware Intel Atom C3338r - All All All
Hardware Intel Atom C3436l - All All All
Hardware Intel Atom C3508 - All All All
Hardware Intel Atom C3538 - All All All
Hardware Intel Atom C3558 - All All All
Hardware Intel Atom C3558r - All All All
Hardware Intel Atom C3558rc - All All All
Hardware Intel Atom C3708 - All All All
Hardware Intel Atom C3750 - All All All
Hardware Intel Atom C3758 - All All All
Hardware Intel Atom C3758r - All All All
Hardware Intel Atom C3808 - All All All
Hardware Intel Atom C3830 - All All All
Hardware Intel Atom C3850 - All All All
Hardware Intel Atom C3858 - All All All
Hardware Intel Atom C3950 - All All All
Hardware Intel Atom C3955 - All All All
Hardware Intel Atom C3958 - All All All
Hardware Intel Atom P5942b - All All All
Hardware Intel Atom X5-a3930 - All All All
Hardware Intel Atom X5-a3940 - All All All
Hardware Intel Atom X5-a3950 - All All All
Hardware Intel Atom X5-a3960 - All All All
Hardware Intel Atom X6200fe - All All All
Hardware Intel Atom X6211e - All All All
Hardware Intel Atom X6212re - All All All
Hardware Intel Atom X6413e - All All All
Hardware Intel Atom X6425e - All All All
Hardware Intel Atom X6425re - All All All
Hardware Intel Atom X6427fe - All All All
Hardware Intel Celeron J3355 - All All All
Hardware Intel Celeron J3355e - All All All
Hardware Intel Celeron J3455 - All All All
Hardware Intel Celeron J3455e - All All All
Hardware Intel Celeron J4005 - All All All
Hardware Intel Celeron J4025 - All All All
Hardware Intel Celeron J4105 - All All All
Hardware Intel Celeron J4125 - All All All
Hardware Intel Celeron J6413 - All All All
Hardware Intel Celeron N3350 - All All All
Hardware Intel Celeron N3350e - All All All
Hardware Intel Celeron N3450 - All All All
Hardware Intel Celeron N4000 - All All All
Hardware Intel Celeron N4020 - All All All
Hardware Intel Celeron N4100 - All All All
Hardware Intel Celeron N4120 - All All All
Hardware Intel Celeron N6211 - All All All
Hardware Intel Core I3-l13g4 - All All All
Hardware Intel Core I5-l16g7 - All All All
Hardware Intel P5921b - All All All
Hardware Intel P5931b - All All All
Hardware Intel P5962b - All All All
Hardware Intel Pentium J4205 - All All All
Hardware Intel Pentium J6425 - All All All
Hardware Intel Pentium N4200 - All All All
Hardware Intel Pentium N4200e - All All All
Hardware Intel Pentium N6415 - All All All
Hardware Intel Pentium Silver J5005 - All All All
Hardware Intel Pentium Silver J5040 - All All All
Hardware Intel Pentium Silver N5000 - All All All
Hardware Intel Pentium Silver N5030 - All All All
Hardware Siemens Simatic Drive Controller - All All All
Operating System Siemens Simatic Drive Controller Firmware All All All All
Hardware Siemens Simatic Et 200sp Open Controller - All All All
Operating System Siemens Simatic Et 200sp Open Controller Firmware All All All All
Hardware Siemens Simatic Ipc127e - All All All
Operating System Siemens Simatic Ipc127e Firmware All All All All

References

ReferenceSourceLinkTags
cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf CONFIRM cert-portal.siemens.com
INTEL-SA-00465 MISC www.intel.com
Debian -- Security Information -- DSA-4934-1 intel-microcode DEBIAN www.debian.org
[SECURITY] [DLA 2718-1] intel-microcode security update MLIST lists.debian.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 159257 Oracle Enterprise Linux Security Update for microcode_ctl (ELSA-2021-2305)
  • 159284 Oracle Enterprise Linux Security Update for microcode_ctl (ELSA-2021-2308)
  • 178683 Debian Security Update for intel-microcode (DSA 4934-1)
  • 178725 Debian Security Update for intel-microcode (DLA 2718-1)
  • 198411 Ubuntu Security Notification for Intel Microcode vulnerabilities (USN-4985-1)
  • 239405 Red Hat Update for microcode_ctl (RHSA-2021:2308)
  • 239406 Red Hat Update for microcode_ctl (RHSA-2021:2307)
  • 239407 Red Hat Update for microcode_ctl (RHSA-2021:2306)
  • 239408 Red Hat Update for microcode_ctl (RHSA-2021:2305)
  • 239409 Red Hat Update for microcode_ctl (RHSA-2021:2304)
  • 239444 Red Hat Update for microcode_ctl (RHSA-2021:2306)
  • 376933 Alibaba Cloud Linux Security Update for microcode_ctl (ALINUX3-SA-2021:0040)
  • 377204 Alibaba Cloud Linux Security Update for microcode_ctl (ALINUX2-SA-2021:0038)
  • 501195 Alpine Linux Security Update for intel-ucode
  • 504019 Alpine Linux Security Update for intel-ucode
  • 590761 Siemens Industrial Products Intel CPUs (Update B) Multiple Vulnerabilities (ICSA-21-222-05)
  • 750142 SUSE Enterprise Linux Security Update for ucode-intel (SUSE-SU-2021:1929-1)
  • 750145 SUSE Enterprise Linux Security Update for ucode-intel (SUSE-SU-2021:1932-1)
  • 750146 SUSE Enterprise Linux Security Update for ucode-intel (SUSE-SU-2021:1931-1)
  • 750147 SUSE Enterprise Linux Security Update for ucode-intel (SUSE-SU-2021:1930-1)
  • 750150 SUSE Enterprise Linux Security Update for ucode-intel (SUSE-SU-2021:1933-1)
  • 750645 OpenSUSE Security Update for ucode-intel (openSUSE-SU-2021:0876-1)
  • 750817 OpenSUSE Security Update for ucode-intel (openSUSE-SU-2021:1933-1)
  • 940294 AlmaLinux Security Update for microcode_ctl (ALSA-2021:2308)
  • 960001 Rocky Linux Security Update for microcode_ctl (RLSA-2021:2308)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report