{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T00:46:00.781","vulnerabilities":[{"cve":{"id":"CVE-2021-0089","sourceIdentifier":"secure@intel.com","published":"2021-06-09T20:15:08.543","lastModified":"2024-11-21T05:41:49.300","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access."},{"lang":"es","value":"Una discrepancia de respuesta observable en algunos Intel® Processors puede permitir a un usuario autorizado permitir potencialmente una divulgación de información por medio de un acceso local"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.0,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-203"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","matchCriteriaId":"E460AA51-FCDA-46B9-AE97-E6676AA5E194"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","matchCriteriaId":"A930E247-0B43-43CB-98FF-6CE7B8189835"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intel:pentium_processors_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"9DF5960F-C6F8-4618-ACC5-393923DE7309"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intel:pentium_processors:-:*:*:*:*:*:*:*","matchCriteriaId":"56FFCEC6-27E2-49D2-96D7-8550F3E0A131"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intel:celeron_processors_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"ABCFC60F-84E5-4196-ADDA-59970E2E6213"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intel:celeron_processors:-:*:*:*:*:*:*:*","matchCriteriaId":"E17EE3B1-B545-4E8C-9758-7BC451796721"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intel:xeon_processors_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"CBCC8CD3-F2D7-4271-9E09-FF3E7DEA8FF2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intel:xeon_processors:-:*:*:*:*:*:*:*","matchCriteriaId":"0C91911E-C3E4-4816-9FAE-6B3FFD41CE8F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intel:core_processors_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"2762E765-9E1A-4500-A4E8-D11AC6393E84"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intel:core_processors:-:*:*:*:*:*:*:*","matchCriteriaId":"7B70FC84-662E-4FB3-9DC8-B419E25C20B6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intel:itanium_processors_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"8D2A66EF-A3DF-4A52-BA95-372644E1D6C9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intel:itanium_processors:-:*:*:*:*:*:*:*","matchCriteriaId":"5A4E66A3-1274-4BB1-8547-7EAF298BAE67"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2021/06/10/1","source":"secure@intel.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2021/06/10/10","source":"secure@intel.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2021/06/10/11","source":"secure@intel.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/","source":"secure@intel.com"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/","source":"secure@intel.com"},{"url":"https://security.gentoo.org/glsa/202107-30","source":"secure@intel.com","tags":["Third Party Advisory"]},{"url":"https://www.debian.org/security/2021/dsa-4931","source":"secure@intel.com","tags":["Third Party Advisory"]},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html","source":"secure@intel.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2021/06/10/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2021/06/10/10","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2021/06/10/11","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.gentoo.org/glsa/202107-30","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.debian.org/security/2021/dsa-4931","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}