Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 04:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.lenovo.com/us/en/solutions/LEN-22133Â - Third Party Advisory | |
References | () http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/104228Â - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040949Â - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1042004Â - | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf - | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf - | |
References | () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html - | |
References | () https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html - | |
References | () https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013Â - Patch, Third Party Advisory, Vendor Advisory | |
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0005Â - | |
References | () https://security.netapp.com/advisory/ntap-20180521-0001/Â - Third Party Advisory | |
References | () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel - Third Party Advisory | |
References | () https://usn.ubuntu.com/3756-1/Â - | |
References | () https://www.debian.org/security/2018/dsa-4273Â - | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html - Vendor Advisory | |
References | () https://www.kb.cert.org/vuls/id/180049Â - Third Party Advisory, US Government Resource | |
References | () https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006Â - | |
References | () https://www.synology.com/support/security/Synology_SA_18_23Â - Third Party Advisory | |
References | () https://www.us-cert.gov/ncas/alerts/TA18-141AÂ - Third Party Advisory, US Government Resource |
Information
Published : 2018-05-22 12:29
Updated : 2024-11-21 04:05
NVD link : CVE-2018-3640
Mitre link : CVE-2018-3640
CVE.ORG link : CVE-2018-3640
JSON object : View
Products Affected
intel
- xeon_e5_1620_v4
- xeon_e5_2430l
- xeon_e3_1268l_v3
- xeon_e5_2450
- xeon_e5_2648l_v3
- xeon_e5_1660_v2
- xeon_e5_2620_v4
- xeon_e5_2650l
- xeon_e5_2623_v3
- xeon_e5_2420
- xeon_e5_2428l
- xeon_e5_2630
- xeon_e5_2609_v2
- xeon_e3_1285_v6
- xeon_e5_2407
- xeon_e5_2643_v4
- xeon_e3_1260l_v5
- xeon_e3_1220_v6
- xeon_e-1105c
- xeon_e5_2630_v3
- xeon_e3_1280_v2
- xeon_e3_1220_v2
- xeon_e3_1275_v2
- xeon_e5_2650_v2
- xeon_e3_1240l_v3
- xeon_e3_1275_v5
- xeon_e3_1225
- xeon_e3_1245_v6
- xeon_e3_1270
- xeon_e3_1240_v2
- xeon_e3_1230_v6
- xeon_e5_2403
- xeon_e5_2630l_v4
- xeon_e3_1290_v2
- xeon_e5_2450_v2
- xeon_e5_1620_v3
- xeon_e5_1620
- xeon_e5_2618l_v4
- core_i5
- xeon_e3_1280
- xeon_e3_1280_v6
- xeon_e5_2628l_v4
- xeon_e5_2643_v3
- core_m
- xeon_e3_1225_v5
- xeon_e5_2648l_v4
- xeon_e3_1225_v6
- xeon_e5_1428l
- atom_c
- xeon_e5_2643
- xeon_e5
- xeon_e5_2637_v2
- xeon_e5_1630_v4
- xeon_e3_1231_v3
- xeon_e5_2630l_v2
- xeon_e5_1620_v2
- xeon_e5_1680_v3
- xeon_e3_1286l_v3
- xeon_e3_1271_v3
- xeon_e5_2648l
- xeon_e3_1240
- xeon_e5_1428l_v3
- xeon_e3_1265l_v2
- xeon_e5_2403_v2
- xeon_e5_2408l_v3
- xeon_e5_2650l_v3
- xeon_e5_1650_v3
- xeon_e5_2640_v2
- xeon_e3_1286_v3
- xeon_e5_2450l_v2
- xeon_e3_1240_v5
- xeon_e5_2637_v4
- xeon_e3_1235
- xeon_e3_1125c_v2
- xeon_e5_2648l_v2
- xeon_e5_2609_v4
- xeon_e3_1245_v3
- xeon_e3_1245_v2
- xeon_e3_1230_v2
- xeon_e5_2630l
- xeon_e5_2603
- xeon_e5_2620_v3
- xeon_e5_2440
- xeon_e5_2628l_v3
- xeon_e5_2448l
- xeon_e3_1265l_v3
- atom_z
- xeon_e3_1105c_v2
- xeon_e3_1220_v3
- xeon_e5_2630l_v3
- xeon_e5_2603_v3
- xeon_e3_1230l_v3
- xeon_e5_2650_v3
- xeon_e5_2603_v4
- xeon_e5_2440_v2
- xeon_e5_1650_v2
- xeon_e5_2650
- xeon_e3_1240_v6
- xeon_e3_1270_v3
- xeon_e3_1501l_v6
- xeon_e3_1280_v5
- xeon_gold
- xeon_e5_2418l
- core_i3
- xeon_e3_1220_v5
- xeon_e3_1280_v3
- xeon_e5_2420_v2
- pentium_silver
- xeon_e3_1245
- core_i7
- xeon_e3_1270_v6
- xeon_e3_1275_v6
- xeon_e3_1240l_v5
- xeon_e3_1285l_v4
- xeon_e5_1650_v4
- xeon_e5_2630_v4
- xeon_e3_1290
- xeon_e5_2608l_v3
- xeon_e5_2623_v4
- xeon_e3_1285_v4
- xeon_e5_2650l_v2
- xeon_e5_2608l_v4
- xeon_e5_2618l_v3
- xeon_e5_2637_v3
- xeon_e5_2620_v2
- xeon_e3_1268l_v5
- xeon_e5_2430_v2
- xeon_e5_2407_v2
- xeon_e5_2640
- xeon_e3_1275_v3
- xeon_e3_1260l
- xeon_e3
- xeon_e5_2448l_v2
- xeon_e5_2630_v2
- xeon_e3_1501m_v6
- xeon_e3_12201_v2
- xeon_e3_1505m_v5
- xeon_e5_2609
- xeon_e5_2643_v2
- xeon_e3_1226_v3
- xeon_e5_1660_v3
- xeon_e5_2430
- xeon_e3_1225_v3
- xeon_e3_1275l_v3
- xeon_e5_2637
- xeon_e5_2628l_v2
- xeon_e5_2418l_v3
- xeon_e5_2640_v3
- pentium
- xeon_e3_1225_v2
- xeon_e5_2450l
- xeon_e3_1281_v3
- xeon_e3_1240_v3
- xeon_e3_1276_v3
- xeon_e5_2428l_v2
- xeon_e5_2470_v2
- xeon_e3_1285_v3
- xeon_e3_1258l_v4
- xeon_e5_1630_v3
- xeon_e3_1265l_v4
- xeon_e5_2470
- celeron_n
- xeon_platinum
- atom_e
- xeon_e5_2620
- xeon_e3_1270_v5
- xeon_e5_2603_v2
- xeon_e5_2428l_v3
- xeon_e5_1660_v4
- xeon_e5_2618l_v2
- xeon_e3_1270_v2
- pentium_j
- xeon_e5_1660
- xeon_e5_2418l_v2
- xeon_e3_1285l_v3
- xeon_e3_1230
- xeon_e3_1241_v3
- xeon_e3_1230_v3
- celeron_j
- xeon_silver
- xeon_e5_1428l_v2
- xeon_e3_12201
- xeon_e7
- xeon_e3_1505l_v5
- xeon_e5_2609_v3
- xeon_e5_1680_v4
- xeon_e5_2650_v4
- xeon_e5_2438l_v3
- xeon_e5_2640_v4
- xeon_e3_1230_v5
- xeon_e3_1245_v5
- xeon_e5_2430l_v2
- xeon_e3_1505l_v6
- xeon_e3_1278l_v4
- xeon_e3_1235l_v5
- xeon_e3_1220l_v3
- xeon_e3_1246_v3
- xeon_e5_1650
arm
- cortex-a
CWE
CWE-203
Observable Discrepancy