Xeon E 2224 Intel Xeon E 2224

stack.watch can notify you when security vulnerabilities are reported in Intel Xeon E 2224. You can add multiple products that you use with Xeon E 2224 to create your own personal software stack watcher.

By the Year

In 2020 there have been 2 vulnerabilities in Intel Xeon E 2224 with an average score of 5.5 out of ten. Last year Xeon E 2224 had 0 security vulnerabilities published. That is, 2 more vulnerabilities have already been reported in 2020 as compared to last year.

Year Vulnerabilities Average Score
2020 2 5.55
2019 0 0.00
2018 0 0.00

It may take a day or so for new Xeon E 2224 vulnerabilities to show up. Additionally vulnerabilities may be tagged under a different product or component name.

Latest Intel Xeon E 2224 Security Vulnerabilities

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may

CVE-2020-0543 5.5 - Medium - June 15, 2020

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVE-2020-0543 can be explotited with local system access, and requires small amount of user privledges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 1.8 out of four. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Information Leak

Load value injection in some Intel(R) Processors utilizing speculative execution may

CVE-2020-0551 5.6 - Medium - March 12, 2020

Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html

CVE-2020-0551 can be explotited with local system access, and requires small amount of user privledges. This vulnerability is consided to have a high level of attack complexity. It has an exploitability score of 1.1 out of four. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Downstream Injection