CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
38.2%
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
Vendor | Product | Version | CPE |
---|---|---|---|
intel | atom_c | c2308 | cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* |
intel | atom_c | c2316 | cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:* |
intel | atom_c | c2338 | cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:* |
intel | atom_c | c2350 | cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:* |
intel | atom_c | c2358 | cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:* |
intel | atom_c | c2508 | cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:* |
intel | atom_c | c2516 | cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:* |
intel | atom_c | c2518 | cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:* |
intel | atom_c | c2530 | cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:* |
intel | atom_c | c2538 | cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:* |
[
{
"product": "Most Modern Operating Systems",
"vendor": "Intel Corporation",
"versions": [
{
"status": "affected",
"version": "All"
}
]
}
]
access.redhat.com/errata/RHSA-2018:2384
access.redhat.com/errata/RHSA-2018:2390
access.redhat.com/errata/RHSA-2018:2395
access.redhat.com/errata/RHSA-2019:1946
access.redhat.com/errata/RHSA-2020:0174
cdrdv2.intel.com/v1/dl/getContent/685359
help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
security.netapp.com/advisory/ntap-20180823-0001/
www.oracle.com/security-alerts/cpujul2020.html
www.oracle.com/security-alerts/cpuoct2020.html
www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
More
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
38.2%