Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access
Exploitability
AV:LAC:HAT:PPR:LUI:PVulnerable System
VC:HVI:HVA:LSubsequent System
SC:NSI:NSA:N5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:NOther