| ID |
CVE-2020-28368
|
| Sažetak |
Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen. |
| Reference |
|
| CVSS |
| Base: | 2.1 |
| Impact: | 2.9 |
| Exploitability: | 3.9 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
LOW |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| PARTIAL |
NONE |
NONE |
|
| CVSS vektor |
AV:L/AC:L/Au:N/C:P/I:N/A:N |
| Zadnje važnije ažuriranje |
07-11-2023 - 03:21 |
| Objavljeno |
10-11-2020 - 19:15 |