vulnerability

Amazon Linux 2023: CVE-2024-28956: Important priority package update for microcode_ctl (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:M/Au:S/C:C/I:N/A:N)
Published
May 13, 2025
Added
Jun 3, 2025
Modified
Sep 30, 2025

Description

Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
New Spectre-v2 attack classes have been discovered within CPU architectures that enable self-training exploitation of speculative execution within the same privilege domain. These novel techniques bypass existing hardware and software mitigations, including IBPB, eIBRS, and BHI_NO, by leveraging in-kernel gadgets (potentially accessible via SECCOMP/cBPF), Branch Target Buffer (BTB) aliasing, and direct-to-indirect branch predictor training. While the root cause lies in CPU architectural behavior, the vulnerability manifests through kernel-level speculation paths, allowing attackers to potentially leak sensitive memory.

Solution

amazon-linux-2023-upgrade-microcode-ctl
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.