U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-23960

Change History

Initial Analysis by NIST 3/22/2022 1:23:02 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Added CVSS V2

								
							
							
						
NIST (AV:L/AC:M/Au:N/C:P/I:N/A:N)
Added CWE

								
							
							
						
NIST NVD-CWE-noinfo
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a65_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a65:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a65ae_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a65ae:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a710_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a710:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a76ae_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a76ae:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:cortex-x2_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-x2:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:neoverse-e1_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:neoverse-e1:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:neoverse-v1_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:neoverse-v1:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a65:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a65ae:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a710:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a76ae:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:cortex-x2:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:neoverse-e1:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:neoverse-v1:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*
          cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*
Changed Reference Type
http://www.openwall.com/lists/oss-security/2022/03/18/2 No Types Assigned
http://www.openwall.com/lists/oss-security/2022/03/18/2 Mailing List, Patch, Third Party Advisory
Changed Reference Type
https://developer.arm.com/support/arm-security-updates No Types Assigned
https://developer.arm.com/support/arm-security-updates Vendor Advisory
Changed Reference Type
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability No Types Assigned
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Mitigation, Patch, Vendor Advisory