Lucene search

K
cveIntelCVE-2018-12130
HistoryMay 30, 2019 - 4:29 p.m.

CVE-2018-12130

2019-05-3016:29:00
CWE-200
intel
web.nvd.nist.gov
493
2
20
cve-2018-12130
microarchitectural fill buffer data sampling
mfbds
speculative execution
information disclosure
side channel
local access
intel
security vulnerability
nvd

CVSS2

4.7

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

CVSS3

5.6

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

5.9

Confidence

Low

EPSS

0.001

Percentile

33.3%

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

Affected configurations

Nvd
Node
intelmicroarchitectural_fill_buffer_data_sampling_firmwareMatch-
AND
intelmicroarchitectural_fill_buffer_data_samplingMatch-
Node
fedoraprojectfedoraMatch29
VendorProductVersionCPE
intelmicroarchitectural_fill_buffer_data_sampling_firmware-cpe:2.3:o:intel:microarchitectural_fill_buffer_data_sampling_firmware:-:*:*:*:*:*:*:*
intelmicroarchitectural_fill_buffer_data_sampling-cpe:2.3:h:intel:microarchitectural_fill_buffer_data_sampling:-:*:*:*:*:*:*:*
fedoraprojectfedora29cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Central Processing Units (CPUs)",
    "vendor": "Intel Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf"
      }
    ]
  }
]

References

Social References

More

CVSS2

4.7

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

CVSS3

5.6

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

5.9

Confidence

Low

EPSS

0.001

Percentile

33.3%