// For flags

CVE-2021-0086

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Observable response discrepancy in floating-point operations for some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

La discrepancia de respuesta observable en las operaciones de punto flotante para algunos procesadores Intel(R) puede permitir que un usuario autorizado permita potencialmente la divulgación de información a través del acceso local

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-22 CVE Reserved
  • 2021-06-09 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-203: Observable Discrepancy
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Intel
Search vendor "Intel"
Pentium Processors Firmware
Search vendor "Intel" for product "Pentium Processors Firmware"
--
Affected
in Intel
Search vendor "Intel"
Pentium Processors
Search vendor "Intel" for product "Pentium Processors"
--
Safe
Intel
Search vendor "Intel"
Celeron Processors Firmware
Search vendor "Intel" for product "Celeron Processors Firmware"
--
Affected
in Intel
Search vendor "Intel"
Celeron Processors
Search vendor "Intel" for product "Celeron Processors"
--
Safe
Intel
Search vendor "Intel"
Xeon Processors Firmware
Search vendor "Intel" for product "Xeon Processors Firmware"
--
Affected
in Intel
Search vendor "Intel"
Xeon Processors
Search vendor "Intel" for product "Xeon Processors"
--
Safe
Intel
Search vendor "Intel"
Core Processors Firmware
Search vendor "Intel" for product "Core Processors Firmware"
--
Affected
in Intel
Search vendor "Intel"
Core Processors
Search vendor "Intel" for product "Core Processors"
--
Safe
Intel
Search vendor "Intel"
Itanium Processors Firmware
Search vendor "Intel" for product "Itanium Processors Firmware"
--
Affected
in Intel
Search vendor "Intel"
Itanium Processors
Search vendor "Intel" for product "Itanium Processors"
--
Safe
Intel
Search vendor "Intel"
Brand Verification Tool
Search vendor "Intel" for product "Brand Verification Tool"
< 11.0.0.1225
Search vendor "Intel" for product "Brand Verification Tool" and version " < 11.0.0.1225"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
33
Search vendor "Fedoraproject" for product "Fedora" and version "33"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
34
Search vendor "Fedoraproject" for product "Fedora" and version "34"
-
Affected