{"id":"CVE-2020-24513","details":"Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","modified":"2026-03-13T00:35:36.357001Z","published":"2021-06-09T19:15:08.963Z","related":["MGASA-2021-0256","SUSE-SU-2021:14758-1","SUSE-SU-2021:1929-1","SUSE-SU-2021:1930-1","SUSE-SU-2021:1931-1","SUSE-SU-2021:1932-1","SUSE-SU-2021:1933-1","openSUSE-SU-2021:0876-1","openSUSE-SU-2021:1933-1","openSUSE-SU-2024:11478-1"],"references":[{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4934"},{"type":"ADVISORY","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-24513.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"fixed":"0209_0105"}]},{"events":[{"introduced":"0"},{"fixed":"21.01.07"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}