Industry-wide severity ratings can be found in the National Vulnerability Database
Atypical reads from malicious software with MMIO privilege may hang the platform and cause a temporary denial-of-service attack.
This scenario is not likely to be of interest to an attacker running on a single-user machine, as such an attacker is likely to have other ways to hang the machine. However, an attacker running in a virtual machine guest could potentially hang the host platform in this scenario if the virtual machine monitor (VMM) provides direct MMIO read access to a vulnerable integrated device. This issue has been assigned CVE-2022-21180 (CVSS 5.5 Medium: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|Name||CVE (CVSS)||Affected Products||Privilege Required||Data Exposure||Mitigation Direction||Software Proposal|
|Undefined MMIO Hang
|CVE-2022-21180 (5.5 Medium: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)||Client (Skylake family)
Intel Xeon E3 processor family (Skylake family)
|MMIO||N/A||Software||Avoid giving untrusted software MMIO access to affected devices.|
Intel recommends that multitenant virtualized environments only provide direct MMIO access for integrated devices to trusted VMs. Refer to the next section for impacted device ranges.
UMH Impacted Device Ranges
The below are integrated PCI device numbers on bus 0 impacted by UMH.
- Device 0
- Device 2 - Integrated Graphics
- GTTMMADR subrange
- Device 4 - Camarillo
Product and Performance Information
Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.