The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-23984

CVE-2024-23984: Intel Processors Information Disclosure

CVE-2024-23984 is an information disclosure vulnerability in Intel Processors' RAPL interface that allows privileged users to expose sensitive data. This article covers technical details, affected systems, and mitigation.

Updated: January 22, 2026

CVE-2024-23984 Overview

CVE-2024-23984 is an information disclosure vulnerability affecting the Running Average Power Limit (RAPL) interface in certain Intel processors. The vulnerability stems from an observable discrepancy in the RAPL interface that may allow a privileged user to potentially enable information disclosure via local access. This type of side-channel vulnerability can be leveraged by attackers with elevated privileges to extract sensitive information from the processor's power management interface.

Critical Impact

A privileged local attacker could exploit observable discrepancies in the Intel RAPL interface to infer sensitive information from other processes or system components, potentially leading to data leakage or further exploitation chains.

Affected Products

  • Intel Processors with RAPL interface (various generations)
  • Systems running affected Intel microcode versions
  • Linux systems with RAPL kernel module enabled

Discovery Timeline

  • September 16, 2024 - CVE-2024-23984 published to NVD
  • November 3, 2025 - Last updated in NVD database

Technical Details for CVE-2024-23984

Vulnerability Analysis

This vulnerability belongs to the class of side-channel attacks (CWE-203: Observable Discrepancy). The Intel RAPL (Running Average Power Limit) interface provides software with the ability to monitor and control power consumption of various processor domains including the CPU core, integrated GPU, and DRAM. The vulnerability arises from observable timing or power consumption discrepancies that can be measured through the RAPL interface.

An attacker with privileged local access can exploit these discrepancies to infer information about computations being performed by other processes or users on the same system. This is particularly concerning in multi-tenant environments such as cloud computing platforms or shared workstations where isolation between users is critical.

The attack requires local access with elevated privileges, making remote exploitation not directly feasible. However, the potential for information disclosure remains significant in environments where an attacker has already gained initial foothold with administrative access.

Root Cause

The root cause lies in the observable discrepancy in how the RAPL interface reports power consumption data. The RAPL Model Specific Registers (MSRs) expose power consumption information that can vary based on the computational operations being performed. By carefully monitoring these variations, an attacker can correlate power consumption patterns with specific operations, potentially revealing sensitive information about the data being processed.

This side-channel exists because the RAPL interface was designed primarily for power management and thermal monitoring, without consideration for the potential information leakage through power consumption patterns.

Attack Vector

The attack requires local access to the system with privileged user permissions. An attacker would need to:

  1. Gain local access to a system with affected Intel processors
  2. Obtain elevated privileges (root/administrator) to access RAPL MSRs
  3. Monitor RAPL interface readings while victim processes execute sensitive operations
  4. Analyze power consumption patterns to extract information through statistical correlation

The attack complexity is considered high due to the need for precise timing measurements and statistical analysis to extract meaningful information from power consumption variations. However, the potential impact on confidentiality is significant, affecting both the vulnerable system and potentially other systems sharing the same processor resources.

Detection Methods for CVE-2024-23984

Indicators of Compromise

  • Unusual or excessive access to RAPL-related MSRs (/sys/class/powercap/intel-rapl/)
  • Processes repeatedly reading power consumption data at high frequencies
  • Unexpected privileged processes monitoring power management interfaces

Detection Strategies

  • Monitor for abnormal access patterns to /sys/class/powercap/intel-rapl/ directories
  • Implement audit rules for RAPL MSR access using Linux auditd
  • Alert on processes that exhibit high-frequency polling of power consumption metrics
  • Review system logs for unauthorized privilege escalation attempts

Monitoring Recommendations

  • Configure SentinelOne to monitor process behavior around RAPL interface access
  • Implement file integrity monitoring on power management sysfs entries
  • Enable kernel auditing for MSR read operations on RAPL registers
  • Deploy endpoint detection rules for side-channel attack patterns

How to Mitigate CVE-2024-23984

Immediate Actions Required

  • Apply the latest Intel microcode updates addressing this vulnerability
  • Update system firmware/BIOS to the latest version from your hardware vendor
  • Restrict access to RAPL interfaces to only essential system processes
  • Review and limit privileged user accounts on affected systems

Patch Information

Intel has released security guidance in Intel Security Advisory SA-01103 addressing this vulnerability. System administrators should apply the latest microcode updates provided by Intel and distribute through their operating system vendors.

For Debian-based systems, updated packages have been announced in the Debian LTS Announcement November 2024 and Debian LTS Announcement December 2024.

Workarounds

  • Restrict access to /sys/class/powercap/intel-rapl/ using filesystem permissions
  • Disable the intel_rapl kernel module if power monitoring is not required
  • Implement strict access controls for privileged accounts
  • Consider using hardware-based isolation for sensitive workloads
bash
# Disable intel_rapl kernel module
echo "blacklist intel_rapl_msr" >> /etc/modprobe.d/blacklist-rapl.conf
echo "blacklist intel_rapl_common" >> /etc/modprobe.d/blacklist-rapl.conf

# Restrict RAPL sysfs permissions (if module is required)
chmod 600 /sys/class/powercap/intel-rapl/*/energy_uj

# Remove module if currently loaded
modprobe -r intel_rapl_msr intel_rapl_common

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechIntel

  • SeverityMEDIUM

  • CVSS Score6.8

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-203
  • Technical References
  • Intel Security Advisory SA-01103

  • Debian LTS Announcement November 2024

  • Debian LTS Announcement December 2024
  • Related CVEs
  • CVE-2025-20073: Intel UEFI DXE Information Disclosure Flaw

  • CVE-2025-22444: Intel UEFI PdaSmm Disclosure Vulnerability

  • CVE-2025-27708: Intel CSME Firmware Information Disclosure

  • CVE-2025-24495: Intel Core Ultra Information Disclosure
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English