Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-33117: information disclosure in Intel(R) Xeon(R) Scalable Processors

0
Medium
VulnerabilityCVE-2021-33117cvecve-2021-33117
Published: Thu May 12 2022 (05/12/2022, 16:36:03 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) Xeon(R) Scalable Processors

Description

Improper access control for some 3rd Generation Intel(R) Xeon(R) Scalable Processors before BIOS version MR7, may allow a local attacker to potentially enable information disclosure via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:25:47 UTC

Technical Analysis

CVE-2021-33117 is a medium-severity vulnerability affecting certain 3rd Generation Intel Xeon Scalable Processors prior to BIOS version MR7. The issue stems from improper access control mechanisms within these processors, which may allow a local attacker with limited privileges (low privileges) to enable information disclosure. Specifically, the vulnerability requires local access to the system and does not require user interaction, but it does require the attacker to have some level of privileges on the affected system. The vulnerability does not impact integrity or availability but can lead to the exposure of sensitive information due to unauthorized access. The CVSS 3.1 score is 5.5, reflecting the moderate risk posed by this flaw. Exploitation involves leveraging the improper access control to read sensitive data from the processor or system memory that should otherwise be protected. No known exploits in the wild have been reported to date. Mitigation involves updating the system BIOS to version MR7 or later, which addresses the improper access control issue. This vulnerability is specific to certain Intel Xeon Scalable processors, which are commonly used in enterprise servers and data centers, making it relevant for organizations relying on these platforms for critical workloads.

Potential Impact

For European organizations, the impact of CVE-2021-33117 primarily concerns confidentiality breaches within data center and enterprise server environments that utilize affected Intel Xeon Scalable processors. Since these processors are widely deployed in cloud infrastructure, financial institutions, telecommunications, and government data centers across Europe, unauthorized information disclosure could lead to exposure of sensitive corporate or personal data. Although the vulnerability requires local access and some privilege level, insider threats or attackers who gain initial footholds could exploit this to escalate data access. This could undermine trust, lead to regulatory non-compliance (e.g., GDPR violations), and cause reputational damage. However, the lack of impact on integrity and availability limits the scope of disruption to data confidentiality only. The absence of known active exploits reduces immediate risk but does not eliminate the threat, especially in high-value environments where attackers may attempt targeted exploitation.

Mitigation Recommendations

1. Immediate BIOS Update: Organizations should prioritize updating affected systems to BIOS version MR7 or later to remediate the improper access control vulnerability. Coordinate with hardware vendors and IT teams to identify impacted servers and schedule updates with minimal disruption. 2. Access Control Hardening: Restrict local access to critical servers by enforcing strict physical and logical access controls, limiting the number of users with local privileges. 3. Monitoring and Auditing: Implement enhanced monitoring of local access attempts and privilege escalations on affected systems to detect suspicious activities that could indicate exploitation attempts. 4. Segmentation and Isolation: Isolate critical servers running vulnerable processors within secure network segments to reduce the risk of lateral movement by attackers who gain local access. 5. Incident Response Preparedness: Update incident response plans to include detection and response procedures for potential exploitation of this vulnerability. 6. Vendor Coordination: Maintain communication with Intel and hardware vendors for any additional patches or mitigations and apply firmware updates promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2021-05-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbb04

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:25:47 PM

Last updated: 2/7/2026, 9:17:14 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats