CVE-2020-28368 PUBLISHED

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.

EPSS 0.07% · 20.5th percentile

Risk Scores

EPSS Score
0.07%
20.5th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSxen0, 4.5.1-0ubuntu1, 4.5.1-0ubuntu2
Ubuntu:20.04:LTSxen0, 4.11.3+24-g14b62ab3e5-1ubuntu2, 4.11.3+24-g14b62ab3e5-1ubuntu2.2
Ubuntu:18.04:LTSxen4.9.0-0ubuntu3, 4.9.0-0ubuntu4, 4.9.2-0ubuntu1

Timeline

References

Open in Interactive Console →