Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
Metrics
No CVSS v4.0
No CVSS v3.1
Attack Vector Local
Attack Complexity High
Privileges Required Low
Scope Changed
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact None
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.00902.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Arm
Subscribe
|
Cortex-a
Subscribe
|
|
Intel
Subscribe
|
Atom C
Subscribe
Atom E
Subscribe
Atom Z
Subscribe
Celeron J
Subscribe
Celeron N
Subscribe
Core I3
Subscribe
Core I5
Subscribe
Core I7
Subscribe
Core M
Subscribe
Pentium
Subscribe
Pentium J
Subscribe
Pentium Silver
Subscribe
Xeon E-1105c
Subscribe
Xeon E3
Subscribe
Xeon E3 1105c V2
Subscribe
Xeon E3 1125c V2
Subscribe
Xeon E3 12201
Subscribe
Xeon E3 12201 V2
Subscribe
Xeon E3 1220 V2
Subscribe
Xeon E3 1220 V3
Subscribe
Xeon E3 1220 V5
Subscribe
Xeon E3 1220 V6
Subscribe
Xeon E3 1220l V3
Subscribe
Xeon E3 1225
Subscribe
Xeon E3 1225 V2
Subscribe
Xeon E3 1225 V3
Subscribe
Xeon E3 1225 V5
Subscribe
Xeon E3 1225 V6
Subscribe
Xeon E3 1226 V3
Subscribe
Xeon E3 1230
Subscribe
Xeon E3 1230 V2
Subscribe
Xeon E3 1230 V3
Subscribe
Xeon E3 1230 V5
Subscribe
Xeon E3 1230 V6
Subscribe
Xeon E3 1230l V3
Subscribe
Xeon E3 1231 V3
Subscribe
Xeon E3 1235
Subscribe
Xeon E3 1235l V5
Subscribe
Xeon E3 1240
Subscribe
Xeon E3 1240 V2
Subscribe
Xeon E3 1240 V3
Subscribe
Xeon E3 1240 V5
Subscribe
Xeon E3 1240 V6
Subscribe
Xeon E3 1240l V3
Subscribe
Xeon E3 1240l V5
Subscribe
Xeon E3 1241 V3
Subscribe
Xeon E3 1245
Subscribe
Xeon E3 1245 V2
Subscribe
Xeon E3 1245 V3
Subscribe
Xeon E3 1245 V5
Subscribe
Xeon E3 1245 V6
Subscribe
Xeon E3 1246 V3
Subscribe
Xeon E3 1258l V4
Subscribe
Xeon E3 1260l
Subscribe
Xeon E3 1260l V5
Subscribe
Xeon E3 1265l V2
Subscribe
Xeon E3 1265l V3
Subscribe
Xeon E3 1265l V4
Subscribe
Xeon E3 1268l V3
Subscribe
Xeon E3 1268l V5
Subscribe
Xeon E3 1270
Subscribe
Xeon E3 1270 V2
Subscribe
Xeon E3 1270 V3
Subscribe
Xeon E3 1270 V5
Subscribe
Xeon E3 1270 V6
Subscribe
Xeon E3 1271 V3
Subscribe
Xeon E3 1275 V2
Subscribe
Xeon E3 1275 V3
Subscribe
Xeon E3 1275 V5
Subscribe
Xeon E3 1275 V6
Subscribe
Xeon E3 1275l V3
Subscribe
Xeon E3 1276 V3
Subscribe
Xeon E3 1278l V4
Subscribe
Xeon E3 1280
Subscribe
Xeon E3 1280 V2
Subscribe
Xeon E3 1280 V3
Subscribe
Xeon E3 1280 V5
Subscribe
Xeon E3 1280 V6
Subscribe
Xeon E3 1281 V3
Subscribe
Xeon E3 1285 V3
Subscribe
Xeon E3 1285 V4
Subscribe
Xeon E3 1285 V6
Subscribe
Xeon E3 1285l V3
Subscribe
Xeon E3 1285l V4
Subscribe
Xeon E3 1286 V3
Subscribe
Xeon E3 1286l V3
Subscribe
Xeon E3 1290
Subscribe
Xeon E3 1290 V2
Subscribe
Xeon E3 1501l V6
Subscribe
Xeon E3 1501m V6
Subscribe
Xeon E3 1505l V5
Subscribe
Xeon E3 1505l V6
Subscribe
Xeon E3 1505m V5
Subscribe
Xeon E5
Subscribe
Xeon E5 1428l
Subscribe
Xeon E5 1428l V2
Subscribe
Xeon E5 1428l V3
Subscribe
Xeon E5 1620
Subscribe
Xeon E5 1620 V2
Subscribe
Xeon E5 1620 V3
Subscribe
Xeon E5 1620 V4
Subscribe
Xeon E5 1630 V3
Subscribe
Xeon E5 1630 V4
Subscribe
Xeon E5 1650
Subscribe
Xeon E5 1650 V2
Subscribe
Xeon E5 1650 V3
Subscribe
Xeon E5 1650 V4
Subscribe
Xeon E5 1660
Subscribe
Xeon E5 1660 V2
Subscribe
Xeon E5 1660 V3
Subscribe
Xeon E5 1660 V4
Subscribe
Xeon E5 1680 V3
Subscribe
Xeon E5 1680 V4
Subscribe
Xeon E5 2403
Subscribe
Xeon E5 2403 V2
Subscribe
Xeon E5 2407
Subscribe
Xeon E5 2407 V2
Subscribe
Xeon E5 2408l V3
Subscribe
Xeon E5 2418l
Subscribe
Xeon E5 2418l V2
Subscribe
Xeon E5 2418l V3
Subscribe
Xeon E5 2420
Subscribe
Xeon E5 2420 V2
Subscribe
Xeon E5 2428l
Subscribe
Xeon E5 2428l V2
Subscribe
Xeon E5 2428l V3
Subscribe
Xeon E5 2430
Subscribe
Xeon E5 2430 V2
Subscribe
Xeon E5 2430l
Subscribe
Xeon E5 2430l V2
Subscribe
Xeon E5 2438l V3
Subscribe
Xeon E5 2440
Subscribe
Xeon E5 2440 V2
Subscribe
Xeon E5 2448l
Subscribe
Xeon E5 2448l V2
Subscribe
Xeon E5 2450
Subscribe
Xeon E5 2450 V2
Subscribe
Xeon E5 2450l
Subscribe
Xeon E5 2450l V2
Subscribe
Xeon E5 2470
Subscribe
Xeon E5 2470 V2
Subscribe
Xeon E5 2603
Subscribe
Xeon E5 2603 V2
Subscribe
Xeon E5 2603 V3
Subscribe
Xeon E5 2603 V4
Subscribe
Xeon E5 2608l V3
Subscribe
Xeon E5 2608l V4
Subscribe
Xeon E5 2609
Subscribe
Xeon E5 2609 V2
Subscribe
Xeon E5 2609 V3
Subscribe
Xeon E5 2609 V4
Subscribe
Xeon E5 2618l V2
Subscribe
Xeon E5 2618l V3
Subscribe
Xeon E5 2618l V4
Subscribe
Xeon E5 2620
Subscribe
Xeon E5 2620 V2
Subscribe
Xeon E5 2620 V3
Subscribe
Xeon E5 2620 V4
Subscribe
Xeon E5 2623 V3
Subscribe
Xeon E5 2623 V4
Subscribe
Xeon E5 2628l V2
Subscribe
Xeon E5 2628l V3
Subscribe
Xeon E5 2628l V4
Subscribe
Xeon E5 2630
Subscribe
Xeon E5 2630 V2
Subscribe
Xeon E5 2630 V3
Subscribe
Xeon E5 2630 V4
Subscribe
Xeon E5 2630l
Subscribe
Xeon E5 2630l V2
Subscribe
Xeon E5 2630l V3
Subscribe
Xeon E5 2630l V4
Subscribe
Xeon E5 2637
Subscribe
Xeon E5 2637 V2
Subscribe
Xeon E5 2637 V3
Subscribe
Xeon E5 2637 V4
Subscribe
Xeon E5 2640
Subscribe
Xeon E5 2640 V2
Subscribe
Xeon E5 2640 V3
Subscribe
Xeon E5 2640 V4
Subscribe
Xeon E5 2643
Subscribe
Xeon E5 2643 V2
Subscribe
Xeon E5 2643 V3
Subscribe
Xeon E5 2643 V4
Subscribe
Xeon E5 2648l
Subscribe
Xeon E5 2648l V2
Subscribe
Xeon E5 2648l V3
Subscribe
Xeon E5 2648l V4
Subscribe
Xeon E5 2650
Subscribe
Xeon E5 2650 V2
Subscribe
Xeon E5 2650 V3
Subscribe
Xeon E5 2650 V4
Subscribe
Xeon E5 2650l
Subscribe
Xeon E5 2650l V2
Subscribe
Xeon E5 2650l V3
Subscribe
Xeon E7
Subscribe
Xeon Gold
Subscribe
Xeon Platinum
Subscribe
Xeon Silver
Subscribe
|
Configuration 1 [-]
|
Configuration 2 [-]
|
No data.
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1446-1 | intel-microcode security update |
Debian DLA |
DLA-1506-1 | intel-microcode security update |
Debian DSA |
DSA-4273-1 | intel-microcode security update |
Debian DSA |
DSA-4273-2 | intel-microcode security update |
EUVD |
EUVD-2018-15494 | Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a. |
Ubuntu USN |
USN-3756-1 | Intel Microcode vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-09-16T19:31:35.612Z
Reserved: 2017-12-28T00:00:00
Link: CVE-2018-3640
No data.
Status : Modified
Published: 2018-05-22T12:29:00.327
Modified: 2024-11-21T04:05:49.447
Link: CVE-2018-3640
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN