4.6
CVSSv2

CVE-2019-11157

Published: 16/12/2019 Updated: 31/12/2019
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Intel Processors could allow a local authenticated malicious user to gain elevated privileges on the system, caused by improper conditions check in voltage settings. An attacker could exploit this vulnerability to escalate privileges or obtain sensitive information via local access.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel xeon_e3-1585_firmware -

intel xeon_e3-1585l_firmware -

intel xeon_e3-1578l_firmware -

intel xeon_e3-1575m_firmware -

intel xeon_e3-1565l_firmware -

intel xeon_e3-1558l_firmware -

intel xeon_e3-1545m_firmware -

intel xeon_e3-1535m_firmware -

intel xeon_e3-1515m_firmware -

intel xeon_e3-1505m_firmware -

intel xeon_e3-1505l_firmware -

intel xeon_e3-1280_firmware -

intel xeon_e3-1275_firmware -

intel xeon_e3-1270_firmware -

intel xeon_e3-1268l_firmware -

intel xeon_e3-1260l_firmware -

intel xeon_e3-1245_firmware -

intel xeon_e3-1240l_firmware -

intel xeon_e3-1240_firmware -

intel xeon_e3-1235l_firmware -

intel xeon_e3-1230_firmware -

intel xeon_e3-1225_firmware -

intel xeon_e3-1220_firmware -

intel xeon_e3-1501l_firmware -

intel xeon_e3-1501m_firmware -

intel xeon_e3-1285_firmware -

intel core_i3-6300_firmware -

intel core_i3-6300t_firmware -

intel core_i3-6320_firmware -

intel core_i3-6100e_firmware -

intel core_i3-6100h_firmware -

intel core_i3-6100u_firmware -

intel core_i3-6102e_firmware -

intel core_i3-6157u_firmware -

intel core_i3-6167u_firmware -

intel core_i3-6100_firmware -

intel core_i3-6100t_firmware -

intel core_i3-6100te_firmware -

intel core_i3-6006u_firmware -

intel core_i3-6098p_firmware -

intel core_i5-6600_firmware -

intel core_i5-6685r_firmware -

intel core_i5-6600k_firmware -

intel core_i5-6600t_firmware -

intel core_i5-6585r_firmware -

intel core_i5-6500_firmware -

intel core_i5-6500t_firmware -

intel core_i5-6500te_firmware -

intel core_i5-6402p_firmware -

intel core_i5-6400_firmware -

intel core_i5-6400t_firmware -

intel core_i5-6440eq_firmware -

intel core_i5-6440hq_firmware -

intel core_i5-6442eq_firmware -

intel core_i5-6360u_firmware -

intel core_i5-6350hq_firmware -

intel core_i5-6300hq_firmware -

intel core_i5-6300u_firmware -

intel core_i5-6200u_firmware -

intel core_i5-6260u_firmware -

intel core_i5-6267u_firmware -

intel core_i5-6287u_firmware -

intel core_i7-6970hq_firmware -

intel core_i7-6920hq_firmware -

intel core_i7-6870hq_firmware -

intel core_i7-6822eq_firmware -

intel core_i7-6820hq_firmware -

intel core_i7-6820hk_firmware -

intel core_i7-6820eq_firmware -

intel core_i7-6785r_firmware -

intel core_i7-6700k_firmware -

intel core_i7-6700t_firmware -

intel core_i7-6700te_firmware -

intel core_i7-6700_firmware -

intel core_i7-6770hq_firmware -

intel core_i7-6700hq_firmware -

intel core_i7-6660u_firmware -

intel core_i7-6650u_firmware -

intel core_i7-6600u_firmware -

intel core_i7-6567u_firmware -

intel core_i7-6560u_firmware -

intel core_i7-6500u_firmware -

intel core_i5-8600t_firmware -

intel core_i5-8600k_firmware -

intel core_i5-8600_firmware -

intel core_i5-8500t_firmware -

intel core_i5-8500b_firmware -

intel core_i5-8500_firmware -

intel core_i5-8400t_firmware -

intel core_i5-8400h_firmware -

intel core_i5-8400b_firmware -

intel core_i5-8400_firmware -

intel core_i5-8365ue_firmware -

intel core_i5-8365u_firmware -

intel core_i5-8350u_firmware -

intel core_i5-8310y_firmware -

intel core_i5-8305g_firmware -

intel core_i5-8300h_firmware -

intel core_i5-8279u_firmware -

intel core_i5-8269u_firmware -

intel core_i5-8265u_firmware -

intel core_i5-8259u_firmware -

intel core_i5-8257u_firmware -

intel core_i5-8250u_firmware -

intel core_i5-8210y_firmware -

intel core_i5-8200y_firmware -

intel core_i7-8665ue_firmware -

intel core_i7-8665u_firmware -

intel core_i7-8557u_firmware -

intel core_i7-8850h_firmware -

intel core_i7-8809g_firmware -

intel core_i7-8750h_firmware -

intel core_i7-8709g_firmware -

intel core_i7-8706g_firmware -

intel core_i7-8705g_firmware -

intel core_i7-8700t_firmware -

intel core_i7-8700k_firmware -

intel core_i7-8700b_firmware -

intel core_i7-8700_firmware -

intel core_i7-8569u_firmware -

intel core_i7-8650u_firmware -

intel core_i7-8565u_firmware -

intel core_i7-8559u_firmware -

intel core_i7-8550u_firmware -

intel core_i7-8500y_firmware -

intel core_i7-8086k_firmware -

intel core_i3-8350k_firmware -

intel core_i3-8300_firmware -

intel core_i3-8300t_firmware -

intel core_i3-8145ue_firmware -

intel core_i3-8145u_firmware -

intel core_i3-8130u_firmware -

intel core_i3-8109u_firmware -

intel core_i3-8100h_firmware -

intel core_i3-8100b_firmware -

intel core_i3-8100_firmware -

intel core_i3-8100t_firmware -

intel core_i3-7350k_firmware -

intel core_i3-7320_firmware -

intel core_i3-7300_firmware -

intel core_i3-7300t_firmware -

intel core_i3-7130u_firmware -

intel core_i3-7102e_firmware -

intel core_i3-7101e_firmware -

intel core_i3-7101te_firmware -

intel core_i3-7100t_firmware -

intel core_i3-7100e_firmware -

intel core_i3-7100_firmware -

intel core_i3-7167u_firmware -

intel core_i3-7100u_firmware -

intel core_i3-7100h_firmware -

intel core_i3-7020u_firmware -

intel core_i5-7600k_firmware -

intel core_i5-7600t_firmware -

intel core_i5-7600_firmware -

intel core_i5-7500_firmware -

intel core_i5-7500t_firmware -

intel core_i5-7442eq_firmware -

intel core_i5-7440hq_firmware -

intel core_i5-7440eq_firmware -

intel core_i5-7400t_firmware -

intel core_i5-7400_firmware -

intel core_i5-7360u_firmware -

intel core_i5-7300u_firmware -

intel core_i5-7300hq_firmware -

intel core_i5-7287u_firmware -

intel core_i5-7267u_firmware -

intel core_i5-7260u_firmware -

intel core_i5-7200u_firmware -

intel core_i5-7y54_firmware -

intel core_i5-7y57_firmware -

intel core_i7-7920hq_firmware -

intel core_i7-7820hq_firmware -

intel core_i7-7820hk_firmware -

intel core_i7-7820eq_firmware -

intel core_i7-7700hq_firmware -

intel core_i7-7700_firmware -

intel core_i7-7700k_firmware -

intel core_i7-7700t_firmware -

intel core_i7-7660u_firmware -

intel core_i7-7600u_firmware -

intel core_i7-7567u_firmware -

intel core_i7-7560u_firmware -

intel core_i7-7500u_firmware -

intel core_i7-7y75_firmware -

intel core_i5-1035g7_firmware -

intel core_i5-1035g4_firmware -

intel core_i5-1035g1_firmware -

intel core_i5-10310y_firmware -

intel core_i5-1030g7_firmware -

intel core_i5-1030g4_firmware -

intel core_i5-10210u_firmware -

intel core_i5-10210y_firmware -

intel core_i3-10110u_firmware -

intel core_i3-10110y_firmware -

intel core_i3-1000g4_firmware -

intel core_i3-1000g1_firmware -

intel core_i3-1005g1_firmware -

intel core_i7-10710u_firmware -

intel core_i7-1065g7_firmware -

intel core_i7-1060g7_firmware -

intel core_i7-10510u_firmware -

intel core_i7-10510y_firmware -

intel core_i3-9350kf_firmware -

intel core_i3-9350k_firmware -

intel core_i3-9320_firmware -

intel core_i3-9300t_firmware -

intel core_i3-9300_firmware -

intel core_i3-9100te_firmware -

intel core_i3-9100t_firmware -

intel core_i3-9100hl_firmware -

intel core_i3-9100f_firmware -

intel core_i3-9100e_firmware -

intel core_i3-9100_firmware -

intel core_i7-9850hl_firmware -

intel core_i7-9850he_firmware -

intel core_i7-9850h_firmware -

intel core_i7-9750hf_firmware -

intel core_i7-9750h_firmware -

intel core_i7-9700te_firmware -

intel core_i7-9700t_firmware -

intel core_i7-9700kf_firmware -

intel core_i7-9700k_firmware -

intel core_i7-9700f_firmware -

intel core_i7-9700e_firmware -

intel core_i7-9700_firmware -

intel core_i5-9600t_firmware -

intel core_i5-9600k_firmware -

intel core_i5-9600kf_firmware -

intel core_i5-9600_firmware -

intel core_i5-9500te_firmware -

intel core_i5-9500t_firmware -

intel core_i5-9500f_firmware -

intel core_i5-9500e_firmware -

intel core_i5-9500_firmware -

intel core_i5-9400f_firmware -

intel core_i5-9400t_firmware -

intel core_i5-9400h_firmware -

intel core_i5-9400_firmware -

intel core_i5-9300hf_firmware -

intel core_i5-9300h_firmware -

intel xeon_e-2186g_firmware -

intel xeon_e-2176g_firmware -

intel xeon_e-2146g_firmware -

intel xeon_e-2126g_firmware -

intel xeon_e-2104g_firmware -

intel xeon_e-2124g_firmware -

intel xeon_e-2144g_firmware -

intel xeon_e-2174g_firmware -

intel xeon_e-2134_firmware -

intel xeon_e-2136_firmware -

intel xeon_e-2124_firmware -

intel xeon_e-2288g_firmware -

intel xeon_e-2278g_firmware -

intel xeon_e-2286g_firmware -

intel xeon_e-2276g_firmware -

intel xeon_e-2246g_firmware -

intel xeon_e-2236_firmware -

intel xeon_e-2226g_firmware -

intel xeon_e-2274g_firmware -

intel xeon_e-2244g_firmware -

intel xeon_e-2234_firmware -

intel xeon_e-2224g_firmware -

intel xeon_e-2224_firmware -

Github Repositories

Tool Suite for V0LTpwn (CVE-2019-11157). Code will be published soon.

V0LTpwn V0LTpwn (CVE-2019-11157) is a software-controlled fault attack on x86 processors It is the first attack corrupting the integrity of SGX enclaves Description All recent Intel processors exhibit a software interface for controlling core voltages without rebooting the system This feature is not required for normal operation but is used by expert users for performance op

PoC in GitHub 2020 CVE-2020-0014 It is possible for a malicious application to construct a TYPE_TOAST window manually and make that window clickable This could lead to a local escalation of privilege with no additional execution privileges needed User action is needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Android-10Android ID: A-1286745

PoC auto collect from GitHub.

PoC in GitHub 2020 CVE-2020-0022 In reassemble_and_dispatch of packet_fragmentercc, there is possible out of bounds write due to an incorrect bounds calculation This could lead to remote code execution over Bluetooth with no additional execution privileges needed User interaction is not needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Andr

Recent Articles

Modern Intel CPUs Plagued By Plundervolt Attack
Threatpost • Lindsey O'Donnell • 11 Dec 2019

Researchers have discovered a new attack impacting modern Intel CPUs, which could allow an attacker to extract highly-sensitive information – such as encryption keys – from affected processors by altering their voltage.
The attack, dubbed “Plundervolt,” centers around Intel Software Guard Extensions (SGX), a set of security-related instruction codes that are built into Intel CPUs. Intel SGX shields sensitive data – such as AES encryption keys – inside “enclaves,” which are ...

Intel might want to reconsider the G part of SGX – because it's been plunderstruck
The Register • Thomas Claburn in San Francisco • 10 Dec 2019

I was caught in the middle of a memory attack, and I knew there was no turning back

Intel on Tuesday plans to release 11 security advisories, including a microcode firmware update to patch a vulnerability in its Software Guard Extensions (SGX) on recent Core microprocessors that allows a privileged attacker to corrupt SGX enclave computations.
The SGX flaw has been dubbed Plundervolt by the computer scientists who found it – Kit Murdock, David Oswald, and Flavio Garcia from the UK's University of Birmingham, Daniel Gruss from Austria's Graz University of Technology, and...

The Register

Boffins at the University of Birmingham in the UK have developed yet another way to compromise the confidentiality of Intel's Software Guard Extensions (SGX) secure enclaves, supposed "safe rooms" for sensitive computation.
Over the past few years, the security of SGX, a set of security-oriented instructions used to set up so-called secure enclaves, has been assailed repeatedly by infosec types. These enclaves are intended to house software and data that not even the computer's administrat...

The Register

Boffins at the University of Birmingham in the UK have developed yet another way to compromise the confidentiality of Intel's Software Guard Extensions (SGX) secure enclaves, supposed "safe rooms" for sensitive computation.
Over the past few years, the security of SGX, a set of security-oriented instructions used to set up so-called secure enclaves, has been assailed repeatedly by infosec types. These enclaves are intended to house software and data that not even the computer's administrat...