Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

N/A

Source -

N/A

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
0Vulnerabilities found

CVE-2018-3646
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-3.98% / 87.93%
||
7 Day CHG+0.64%
Published-14 Aug, 2018 | 19:00
Updated-17 Sep, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

Action-Not Available
Vendor-Intel Corporation
Product-core_m7core_m3core_i5xeoncore_mcore_i7core_m5core_i3Multiple
CVE-2018-3620
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-3.10% / 86.28%
||
7 Day CHG~0.00%
Published-14 Aug, 2018 | 19:00
Updated-17 Sep, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

Action-Not Available
Vendor-Intel Corporation
Product-core_m7core_m3core_i5xeoncore_mcore_i7core_m5core_i3Multiple
CWE ID-CWE-203
Observable Discrepancy
CVE-2018-3693
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-1.19% / 77.99%
||
7 Day CHG~0.00%
Published-10 Jul, 2018 | 21:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

Action-Not Available
Vendor-Oracle CorporationArm LimitedNetApp, Inc.Red Hat, Inc.Fujitsu LimitedIntel Corporation
Product-enterprise_linux_server_eusxeon_e3_12201enterprise_linux_server_ausxeon_e3_1225_v3xeon_e5_2450lxeon_e5_1620_v3xeon_e5_1428lxeon_e5_1620_v4xeon_e3_1240l_v5xeon_e3_1270xeon_e3_1220_v6xeon_e3_1230l_v3xeon_e3_1230_v2xeon_e3_1225_v5xeon_e5_1630_v3xeon_bronze_3106xeon_e5_1680_v3xeon_e5_2643_v2m12-2senterprise_linux_workstationxeon_e3_1235xeon_e3_1281_v3xeon_e3_1220l_v3xeon_e3_1275xeon_e5_2450_v2xeon_e5_2408l_v3xeon_e5_1428l_v3xeon_phixeon_e3_1240_v2xeon_e5_2648lxeon_e3_1276_v3xeon_silverxeon_e5_2609_v4atom_zxeon_e3_1265l_v2xeon_e3_1278l_v4xeon_e5_1620_v2xeon_e3_1240xeon_e5_2630_v2xeon_e3_1246_v3xeon_e5_2637core_i7xeon_e-1105cxeon_e5_2448lxeon_e5_2630lxeon_e5_2643xeon_e3_1275l_v3core_m3xeon_e3_1105c_v2xeon_e5_2637_v2xeon_e3xeon_e3_1245_v5xeon_e5_2430_v2xeon_e5_2640_v4xeon_e5_2648l_v2xeon_e5_2608l_v3enterprise_linux_serverxeon_e3_1501l_v6m12-1xeon_e3_1230_v3xeon_e3_1226_v3xeon_e5_1650_v3xeon_e5_2430lxeon_e5_2428l_v3xeon_e3_1240_v5xeon_e5_2430l_v2xeon_e5_2637_v3xeon_e7xeon_e3_1280_v5xeon_e3_1245_v6xeon_e5_2420_v2solidfire_element_os_management_nodexeon_e5_2648l_v3core_i3celeron_nxeon_e5_2428lxeon_e3_1505m_v5xeon_e5_1660_v4xeon_e5_2620_v4xeon_e5_2428l_v2core_i5xeon_e3_1235l_v5xeon_e5_1660_v3celeron_jxeon_e5_2407_v2xeon_e5_2650_v2xeon_e3_1245_v3xeon_e3_1505l_v5xeon_e3_1230xeon_e3_1225xeon_e3_1245m12-2xeon_e5_2630_v4pentium_jatom_x3core_m7xeon_e3_1241_v3xeon_e3_1275_v2xeon_e3_1275_v6xeon_e3_1285l_v3xeon_e5_1620xeon_e5_2620_v3xeon_e5_2630l_v3cortex-axeon_e5_2640_v2xeon_platinumxeon_e5_1680_v4xeon_e5_2628l_v3xeon_e5_2609_v2xeon_e5_2430xeon_e5_2643_v3xeon_e5_1428l_v2xeon_e3_1240l_v3xeon_e3_1285l_v4xeon_bronze_3104xeon_e3_1125cxeon_e3_1230_v6xeon_e5_1630_v4communications_eagle_application_processorxeon_e5_2407xeon_e5_2643_v4xeon_e3_1220_v3xeon_e3_1280_v6xeon_e5_2620communications_lsmsxeon_e3_1285_v6enterprise_linux_server_tusxeon_e5_2618l_v4xeon_e3_1275_v3xeon_e3_1505l_v6xeon_e5_2418lxeon_e3_1275_v5xeon_e3_1286_v3xeon_e3_1220xeon_e3_1268l_v5xeon_e3_1240_v6xeon_e3_1290xeon_e5_2620_v2xeon_e3_1270_v5xeon_e5_2448l_v2xeon_e5_1650_v4core_m5xeon_e5_2450l_v2xeon_e5_2630l_v4xeon_e5_2403_v2xeon_e5_2609_v3cortex-rxeon_e3_1220_v5xeon_e3_1268l_v3xeon_e5_2603xeon_e3_1285_v3xeon_e5_2630_v3xeon_e5_2450xeon_e5_2623_v3xeon_e5_2650l_v3xeon_e3_1501m_v6m12-2s_firmwarecore_mxeon_e5_2650l_v2enterprise_linux_desktopxeon_e3_1231_v3xeon_e3_1265l_v4xeon_e3_1280_v2xeon_e5_1650xeon_e5_2470xeon_e5_2438l_v3enterprise_linuxxeon_goldxeon_e5_2603_v3xeon_e3_1286l_v3atom_catom_em12-1_firmwarexeon_e5_2603_v2pentium_nxeon_e3_1290_v2xeon_e5_1660xeon_e5_2618l_v3xeon_e5_2603_v4xeon_e5_2618l_v2xeon_e3_1220_v2xeon_e3_1270_v6xeon_e3_1280_v3xeon_e3_1225_v2xeonxeon_e3_1271_v3xeon_e3_12201_v2xeon_e5_2623_v4xeon_e3_1270_v2xeon_e5xeon_e3_1280xeon_e5_2640_v3xeon_e5_2628l_v4xeon_e3_1230_v5xeon_e3_1270_v3xeon_e5_2440xeon_e5_2440_v2xeon_e5_2608l_v4xeon_e5_2650enterprise_linux_eusxeon_e3_1265l_v3xeon_e5_1650_v2xeon_e3_1258l_v4xeon_e5_2650_v4xeon_e5_2609xeon_e5_2418l_v3xeon_e3_1260l_v5xeon_e5_2650lxeon_e5_2628l_v2xeon_e5_2418l_v2xeon_e3_1225_v6xeon_e5_2470_v2xeon_e5_2640xeon_e3_1245_v2xeon_e5_2637_v4struxureware_data_center_expertxeon_e3_1285_v4xeon_e5_2630l_v2xeon_e5_2650_v3xeon_e3_1240_v3xeon_e5_2648l_v4xeon_e5_1660_v2xeon_e5_2403xeon_e3_1260lxeon_e5_2630m12-2_firmwarexeon_e5_2420xeon_e3_1125c_v2Most Modern Operating Systems
CVE-2018-3665
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-1.32% / 79.04%
||
7 Day CHG~0.00%
Published-21 Jun, 2018 | 20:00
Updated-17 Sep, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.

Action-Not Available
Vendor-Intel CorporationDebian GNU/LinuxFreeBSD FoundationRed Hat, Inc.Citrix (Cloud Software Group, Inc.)Canonical Ltd.
Product-core_m7ubuntu_linuxfreebsdxenservercore_m3debian_linuxenterprise_linux_desktopenterprise_linux_workstationcore_i5enterprise_linuxcore_mcore_i7core_m5core_i3Intel Core-based microprocessors
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-9056
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.12% / 32.01%
||
7 Day CHG~0.00%
Published-27 Mar, 2018 | 17:00
Updated-05 Aug, 2024 | 07:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope.

Action-Not Available
Vendor-n/aIntel CorporationArm Limited
Product-xeon_e3_12201xeon_e3_1225_v3xeon_e5_2450lxeon_e5_1620_v3xeon_e5_1428lxeon_e5_1620_v4xeon_e3_1240l_v5xeon_e3_1270xeon_e3_1220_v6xeon_e3_1230l_v3xeon_e3_1230_v2xeon_e3_1225_v5xeon_e5_1630_v3xeon_bronze_3106xeon_e5_1680_v3xeon_e5_2643_v2xeon_e3_1235xeon_e3_1281_v3xeon_e3_1220l_v3xeon_e3_1275xeon_e5_2450_v2xeon_e5_2408l_v3xeon_e5_1428l_v3xeon_phixeon_e3_1240_v2xeon_e5_2648lxeon_e3_1276_v3xeon_silverxeon_e5_2609_v4atom_zxeon_e3_1265l_v2xeon_e3_1278l_v4xeon_e5_1620_v2xeon_e3_1240xeon_e5_2630_v2xeon_e3_1246_v3xeon_e5_2637core_i7xeon_e-1105cxeon_e5_2448lxeon_e5_2630lxeon_e5_2643xeon_e3_1275l_v3core_m3xeon_e3_1105c_v2xeon_e5_2637_v2xeon_e3xeon_e3_1245_v5xeon_e5_2430_v2xeon_e5_2640_v4xeon_e5_2648l_v2xeon_e5_2608l_v3xeon_e3_1501l_v6xeon_e3_1230_v3xeon_e3_1226_v3xeon_e5_1650_v3xeon_e5_2430lxeon_e5_2428l_v3xeon_e3_1240_v5xeon_e5_2430l_v2xeon_e5_2637_v3xeon_e7xeon_e3_1280_v5xeon_e3_1245_v6xeon_e5_2420_v2xeon_e5_2648l_v3core_i3celeron_nxeon_e5_2428lxeon_e3_1505m_v5xeon_e5_1660_v4xeon_e5_2620_v4xeon_e5_2428l_v2core_i5xeon_e3_1235l_v5xeon_e5_1660_v3celeron_jxeon_e5_2407_v2xeon_e5_2650_v2xeon_e3_1245_v3xeon_e3_1505l_v5xeon_e3_1230xeon_e3_1225xeon_e3_1245xeon_e5_2630_v4pentium_jatom_x3core_m7xeon_e3_1241_v3xeon_e3_1275_v2xeon_e3_1275_v6xeon_e3_1285l_v3xeon_e5_1620xeon_e5_2620_v3xeon_e5_2630l_v3cortex-axeon_e5_2640_v2xeon_platinumxeon_e5_1680_v4xeon_e5_2628l_v3xeon_e5_2609_v2xeon_e5_2430xeon_e5_2643_v3xeon_e5_1428l_v2xeon_e3_1240l_v3xeon_e3_1285l_v4xeon_bronze_3104xeon_e3_1125cxeon_e3_1230_v6xeon_e5_1630_v4xeon_e5_2407xeon_e5_2643_v4xeon_e3_1220_v3xeon_e3_1280_v6xeon_e5_2620xeon_e3_1285_v6xeon_e5_2618l_v4xeon_e3_1275_v3xeon_e3_1505l_v6xeon_e5_2418lxeon_e3_1275_v5xeon_e3_1286_v3xeon_e3_1220xeon_e3_1268l_v5xeon_e3_1240_v6xeon_e3_1290xeon_e5_2620_v2xeon_e3_1270_v5xeon_e5_2448l_v2xeon_e5_1650_v4core_m5xeon_e5_2450l_v2xeon_e5_2630l_v4xeon_e5_2403_v2xeon_e5_2609_v3xeon_e3_1220_v5xeon_e3_1268l_v3xeon_e5_2603xeon_e3_1285_v3xeon_e5_2630_v3xeon_e5_2450xeon_e5_2623_v3xeon_e5_2650l_v3xeon_e3_1501m_v6core_mxeon_e5_2650l_v2xeon_e3_1231_v3xeon_e3_1265l_v4xeon_e3_1280_v2xeon_e5_1650xeon_e5_2470xeon_e5_2438l_v3xeon_goldxeon_e5_2603_v3xeon_e3_1286l_v3atom_catom_exeon_e5_2603_v2pentium_nxeon_e3_1290_v2xeon_e5_1660xeon_e5_2618l_v3xeon_e5_2603_v4xeon_e5_2618l_v2xeon_e3_1220_v2xeon_e3_1270_v6xeon_e3_1280_v3xeon_e3_1225_v2xeonxeon_e3_1271_v3xeon_e3_12201_v2xeon_e5_2623_v4xeon_e3_1270_v2xeon_e5xeon_e3_1280xeon_e5_2640_v3xeon_e5_2628l_v4xeon_e3_1230_v5xeon_e3_1270_v3xeon_e5_2440xeon_e5_2440_v2xeon_e5_2608l_v4xeon_e5_2650xeon_e3_1265l_v3xeon_e5_1650_v2xeon_e3_1258l_v4xeon_e5_2650_v4xeon_e5_2609xeon_e5_2418l_v3xeon_e3_1260l_v5xeon_e5_2650lxeon_e5_2628l_v2xeon_e5_2418l_v2xeon_e3_1225_v6xeon_e5_2470_v2xeon_e5_2640xeon_e3_1245_v2xeon_e5_2637_v4xeon_e3_1285_v4xeon_e5_2630l_v2xeon_e5_2650_v3xeon_e3_1240_v3xeon_e5_2648l_v4xeon_e5_1660_v2xeon_e5_2403xeon_e3_1260lxeon_e5_2630xeon_e5_2420xeon_e3_1125c_v2n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5754
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-88.88% / 99.50%
||
7 Day CHG~0.00%
Published-04 Jan, 2018 | 13:00
Updated-16 Sep, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

Action-Not Available
Vendor-Intel CorporationArm Limited
Product-xeon_e3_12201xeon_e3_1225_v3xeon_e5_2450lxeon_e5_1620_v3xeon_e5_1428lxeon_e5_1620_v4xeon_e3_1240l_v5xeon_e3_1270xeon_e3_1220_v6xeon_e3_1230l_v3xeon_e3_1230_v2xeon_e3_1225_v5xeon_e5_1630_v3xeon_bronze_3106xeon_e5_1680_v3xeon_e5_2643_v2xeon_e3_1235xeon_e3_1281_v3xeon_e3_1220l_v3xeon_e3_1275xeon_e5_2450_v2xeon_e5_2408l_v3xeon_e5_1428l_v3xeon_phixeon_e3_1240_v2xeon_e5_2648lxeon_e3_1276_v3xeon_silverxeon_e5_2609_v4atom_zxeon_e3_1265l_v2xeon_e3_1278l_v4xeon_e5_1620_v2xeon_e3_1240xeon_e5_2630_v2xeon_e3_1246_v3xeon_e5_2637core_i7xeon_e-1105cxeon_e5_2448lxeon_e5_2630lxeon_e5_2643xeon_e3_1275l_v3core_m3xeon_e3_1105c_v2xeon_e5_2637_v2xeon_e3xeon_e3_1245_v5xeon_e5_2430_v2xeon_e5_2640_v4xeon_e5_2648l_v2xeon_e5_2608l_v3xeon_e3_1501l_v6xeon_e3_1230_v3xeon_e3_1226_v3xeon_e5_1650_v3xeon_e5_2430lxeon_e5_2428l_v3xeon_e3_1240_v5xeon_e5_2430l_v2xeon_e5_2637_v3xeon_e7xeon_e3_1280_v5xeon_e3_1245_v6xeon_e5_2420_v2xeon_e5_2648l_v3core_i3celeron_nxeon_e5_2428lxeon_e3_1505m_v5xeon_e5_1660_v4xeon_e5_2620_v4xeon_e5_2428l_v2core_i5xeon_e3_1235l_v5xeon_e5_1660_v3celeron_jxeon_e5_2407_v2xeon_e5_2650_v2xeon_e3_1245_v3xeon_e3_1505l_v5xeon_e3_1230xeon_e3_1225xeon_e3_1245xeon_e5_2630_v4pentium_jatom_x3core_m7xeon_e3_1241_v3xeon_e3_1275_v2xeon_e3_1275_v6xeon_e3_1285l_v3xeon_e5_1620xeon_e5_2620_v3xeon_e5_2630l_v3cortex-axeon_e5_2640_v2xeon_platinumxeon_e5_1680_v4xeon_e5_2628l_v3xeon_e5_2609_v2xeon_e5_2430xeon_e5_2643_v3xeon_e5_1428l_v2xeon_e3_1240l_v3xeon_e3_1285l_v4xeon_bronze_3104xeon_e3_1125cxeon_e3_1230_v6xeon_e5_1630_v4xeon_e5_2407xeon_e5_2643_v4xeon_e3_1220_v3xeon_e3_1280_v6xeon_e5_2620xeon_e3_1285_v6xeon_e5_2618l_v4xeon_e3_1275_v3xeon_e3_1505l_v6xeon_e5_2418lxeon_e3_1275_v5xeon_e3_1286_v3xeon_e3_1220xeon_e3_1268l_v5xeon_e3_1240_v6xeon_e3_1290xeon_e5_2620_v2xeon_e3_1270_v5xeon_e5_2448l_v2xeon_e5_1650_v4core_m5xeon_e5_2450l_v2xeon_e5_2630l_v4xeon_e5_2403_v2xeon_e5_2609_v3xeon_e3_1220_v5xeon_e3_1268l_v3xeon_e5_2603xeon_e3_1285_v3xeon_e5_2630_v3xeon_e5_2450xeon_e5_2623_v3xeon_e5_2650l_v3xeon_e3_1501m_v6core_mxeon_e5_2650l_v2xeon_e3_1231_v3xeon_e3_1265l_v4xeon_e3_1280_v2xeon_e5_1650xeon_e5_2470xeon_e5_2438l_v3xeon_goldxeon_e5_2603_v3xeon_e3_1286l_v3atom_catom_exeon_e5_2603_v2pentium_nxeon_e3_1290_v2xeon_e5_1660xeon_e5_2618l_v3xeon_e5_2603_v4xeon_e5_2618l_v2xeon_e3_1220_v2xeon_e3_1270_v6xeon_e3_1280_v3xeon_e3_1225_v2xeonxeon_e3_1271_v3xeon_e3_12201_v2xeon_e5_2623_v4xeon_e3_1270_v2xeon_e5xeon_e3_1280xeon_e5_2640_v3xeon_e5_2628l_v4xeon_e3_1230_v5xeon_e3_1270_v3xeon_e5_2440xeon_e5_2440_v2xeon_e5_2608l_v4xeon_e5_2650xeon_e3_1265l_v3xeon_e5_1650_v2xeon_e3_1258l_v4xeon_e5_2650_v4xeon_e5_2609xeon_e5_2418l_v3xeon_e3_1260l_v5xeon_e5_2650lxeon_e5_2628l_v2xeon_e5_2418l_v2xeon_e3_1225_v6xeon_e5_2470_v2xeon_e5_2640xeon_e3_1245_v2xeon_e5_2637_v4xeon_e3_1285_v4xeon_e5_2630l_v2xeon_e5_2650_v3xeon_e3_1240_v3xeon_e5_2648l_v4xeon_e5_1660_v2xeon_e5_2403xeon_e3_1260lxeon_e5_2630xeon_e5_2420xeon_e3_1125c_v2Most Modern Operating Systems
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5753
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-94.30% / 99.94%
||
7 Day CHG~0.00%
Published-04 Jan, 2018 | 13:00
Updated-14 Jan, 2025 | 19:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Action-Not Available
Vendor-pepperl-fuchsIntel CorporationCanonical Ltd.openSUSENetApp, Inc.Synology, Inc.VMware (Broadcom Inc.)SUSEPhoenix Contact GmbH & Co. KGDebian GNU/LinuxArm LimitedSiemens AGOracle Corporation
Product-xeon_e3_1271_v3simatic_itc1900xeon_e7xeon_e5_1660_v4xeon_e5_2640_v4cortex-a8_firmwarexeon_e5_1620_v4bl_rackmount_4u_firmwarexeon_silvercortex-a76xeon_e5_2630lcortex-a15_firmwarexeon_e3_1230_v2cortex-r8xeon_e3_1260l_v5bl_ppc15_1000_firmwarecore_m3xeon_e3_1505l_v6xeon_e5_2403_v2xeon_e5_2430l_v2bl2_ppc_1000cortex-a72pentium_jxeon_e5_2428l_v2xeon_e5_2609_v3xeon_e5_2630_v4btc12vl2_ppc_3000xeon_e-1105cxeon_e5_1620xeon_e3_1230_v3xeon_e3_1220_v2xeon_e3_1268l_v3cortex-a73xeon_e3_1270_v5vl2_bpc_7000_firmwarexeon_e3_12201cortex-a77xeon_e3_1258l_v4xeon_e5_1650_v4simatic_winac_rtx_\(f\)_2010_firmwareatom_x5-e3940simatic_itc2200_firmwarexeon_e5_2630l_v2xeon_e5_1620_v3xeon_e3_1275l_v3bl_bpc_3001simatic_itc1500_firmwarecortex-a12_firmwarexeon_e3_1220_v5bl_ppc17_7000dl_ppc15m_7000xeon_e3_1260lvl2_ppc_9000xeon_e5_2630_v2bl_ppc17_1000vl2_bpc_3000_firmwarexeon_e5_2418l_v3bl_ppc_1000bl_rackmount_4ubl2_ppc_1000_firmwarexeon_e5_2418lxeon_e3_1285_v6el_ppc_1000\/m_firmwarexeon_e5_1650xeon_e5_2408l_v3vl2_bpc_1000_firmwarexeon_e5_2420xeon_e5_2608l_v3bl_bpc_2001xeon_e3_1265l_v3xeon_e5_2623_v3xeon_e3_1275_v6xeon_e3_1285_v4simatic_itc1900_firmwarevl2_ppc_1000cortex-a9_firmwarexeon_e5_2430xeon_e5_1428lvs360hd_firmwarexeon_e5_2440xeon_e5_2648l_v4xeon_platinumsuse_linux_enterprise_serverxeon_e3_1280_v3bl_ppc12_1000_firmwarexeon_e5_2407xeonvl2_ppc9_1000_firmwarecortex-a9neoverse_n1_firmwarexeon_e3_1240_v6xeon_e3_1275_v5xeon_e5_1680_v3xeon_e5_2428lxeon_e3_1220cortex-x1_firmwarexeon_e5_2650l_v2vl2_ppc_7000_firmwarexeon_e3_1105c_v2bl_ppc15_7000_firmwarebl2_bpc_2000vs960hd_firmwarecortex-a57xeon_e3_1265l_v2cortex-r7_firmwarevl_ipc_p7000_firmwarexeon_e5_2648lxeon_e5_1660_v3xeon_e3_1280_v2core_i3vl2_ppc_9000_firmwarevl2_ppc_2000_firmwarexeon_e5_2440_v2xeon_e5_2603_v2cortex-a77_firmwarexeon_e3_1240_v5xeon_e3_1241_v3vl2_ppc_1000_firmwarecortex-r7xeon_e5_1428l_v3xeon_e5_2430_v2xeon_e3_1240_v2xeon_e5_2620bl_bpc_3000_firmwarefusionxeon_e5_1650_v3xeon_e5_2609_v2diskstation_managerxeon_e3_1225_v2btc14bl_bpc_7001_firmwarexeon_e5_2430lvl2_bpc_1000xeon_e5_1650_v2xeon_e5_2438l_v3vl_bpc_2000_firmwarexeon_e5_2650xeon_e5_2407_v2xeon_e5_1620_v2cortex-a78ae_firmwarecore_i5xeon_e3_1240_v3workstationbl_ppc15_1000atom_x3el_ppc_1000\/wtxeon_e5_2650lcortex-a72_firmwarebl_ppc17_7000_firmwareceleron_jvl2_ppc7_1000bl_bpc_7000cortex-a78bl_bpc_2000bl2_bpc_1000_firmwarevl2_ppc_2000xeon_e3_1246_v3suse_linux_enterprise_desktopvirtual_machine_managerbtc14_firmwarexeon_e5_2603_v3bl2_ppc_7000xeon_e5_2637xeon_e3xeon_e3_1290_v2xeon_e5_2623_v4dl_ppc15m_7000_firmwarexeon_e5_2637_v4bl2_ppc_2000core_m7xeon_e5_2470el_ppc_1000\/mxeon_e5_2637_v3valueline_ipc_firmwarexeon_e3_1270neoverse_n2bl_ppc15_3000vl_bpc_3000xeon_e3_1225_v3xeon_e5_2450_v2cortex-a17bl_ppc17_1000_firmwarexeon_e3_1285l_v3xeon_e3_1220l_v3xeon_e5_2418l_v2xeon_e5_2603xeon_e5_2648l_v3core_m5xeon_e5_2630_v3xeon_e3_1230l_v3xeon_e3_1268l_v5vl2_ppc9_1000xeon_e3_1278l_v4vl_ipc_p7000vl2_bpc_9000_firmwarebl_ppc_1000_firmwarexeon_e5_2637_v2vl2_ppc12_1000_firmwarexeon_e5dl_ppc18.5m_7000vl2_ppc12_1000xeon_goldxeon_e3_1501l_v6cortex-a57_firmwarexeon_e3_1501m_v6xeon_e5_1680_v4xeon_e5_2650_v3visunet_rm_shellxeon_e3_1226_v3dl_ppc15_1000_firmwarexeon_e5_1660solarisxeon_e5_2630l_v3btc12_firmwarexeon_e3_1280_v5bl_bpc_2001_firmwarexeon_e5_1428l_v2vl_ppc_2000_firmwarerouter_managerbl2_ppc_7000_firmwarexeon_e3_1280xeon_e3_1235skynasdl_ppc21.5m_7000_firmwarexeon_e3_1230_v6xeon_e5_2643xeon_e5_2628l_v3debian_linuxbl_bpc_7000_firmwareel_ppc_1000_firmwarexeon_e3_1240l_v5cortex-a76_firmwarecortex-a73_firmwarevl2_bpc_9000xeon_e5_2618l_v3xeon_bronze_3104xeon_e5_1630_v3vl2_bpc_2000xeon_e3_1270_v2xeon_e5_1660_v2xeon_e5_2420_v2simatic_itc2200_proxeon_e3_1290bl_ppc17_3000_firmwarexeon_e5_2450xeon_e5_2618l_v4el_ppc_1000xeon_e5_2448lxeon_e3_1275_v2dl_ppc18.5m_7000_firmwarevl_ppc_2000leapel_ppc_1000\/wt_firmwarebl_ppc_7000xeon_e5_2650_v2xeon_e5_2403xeon_e5_2428l_v3simatic_itc1900_pro_firmwarecortex-a17_firmwarexeon_e5_2620_v2xeon_bronze_3106xeon_e5_2609neoverse_n1bl_ppc15_3000_firmwarecore_mbl2_ppc_2000_firmwaresimatic_winac_rtx_\(f\)_2010simatic_itc1500vl2_ppc_3000_firmwarexeon_e5_2603_v4esxixeon_e5_2630l_v4xeon_e3_1245_v6xeon_e3_1270_v6xeon_e5_2640_v2simatic_itc1500_proxeon_e3_1231_v3vl_bpc_3000_firmwarevs360hdxeon_e3_1125cbl_bpc_3001_firmwarehcivl2_ppc_7000xeon_e3_1505l_v5simatic_itc1500_pro_firmwarexeon_e5_2643_v3xeon_e5_2620_v4valueline_ipcbl_rackmount_2u_firmwarepentium_nubuntu_linuxbl2_bpc_7000atom_zxeon_e5_2450lcortex-r8_firmwarexeon_e3_1230vl_ppc_3000xeon_e5_2450l_v2xeon_e5_1630_v4bl_bpc_7001simatic_itc2200atom_evl_ppc_3000_firmwareatom_x7-e3950bl2_bpc_2000_firmwarebl2_bpc_7000_firmwarexeon_e3_1230_v5xeon_e5_2648l_v2vl_bpc_1000xeon_e5_2618l_v2xeon_e3_1265l_v4xeon_e3_1281_v3xeon_e3_1276_v3dl_ppc21.5m_7000xeon_e3_1225_v5xeon_e3_1245_v5xeon_e3_1275_v3vl2_bpc_2000_firmwarecortex-a15xeon_e5_2643_v4xeon_e3_1505m_v5atom_cxeon_e3_1286_v3xeon_e3_1245_v2bl_ppc15_7000xeon_e3_1125c_v2atom_x5-e3930vl_bpc_1000_firmwarevl2_bpc_7000xeon_e5_2609_v4vl2_bpc_3000xeon_e5_2650l_v3bl_ppc12_1000vl_bpc_2000xeon_e5_2640xeon_e3_1280_v6bl_bpc_2000_firmwarexeon_e3_1220_v6xeon_e5_2630cortex-x1cortex-a78aexeon_e5_2628l_v2simatic_itc1900_probl_rackmount_2uxeon_e3_1245xeon_e5_2650_v4dl_ppc15_1000xeon_e3_1245_v3xeon_e3_1235l_v5bl_ppc17_3000xeon_e3_1240l_v3local_service_management_systemxeon_e3_1285_v3cortex-a12cortex-a75_firmwarecortex-a75vs960hdxeon_phixeon_e3_1286l_v3cortex-a78_firmwaresimatic_itc2200_pro_firmwarexeon_e5_2628l_v4xeon_e5_2640_v3bl2_bpc_1000xeon_e5_2448l_v2vl2_ppc7_1000_firmwarebl_bpc_3000xeon_e3_1285l_v4xeon_e3_12201_v2xeon_e5_2470_v2xeon_e3_1220_v3xeon_e3_1270_v3celeron_nxeon_e5_2608l_v4xeon_e3_1275xeon_e3_1225xeon_e3_1240cortex-a8bl_ppc_7000_firmwareneoverse_n2_firmwarexeon_e5_2620_v3xeon_e5_2643_v2core_i7xeon_e3_1225_v6solidfiresuse_linux_enterprise_software_development_kitMost Modern Operating Systems
CWE ID-CWE-203
Observable Discrepancy
CVE-2017-5715
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-5.6||MEDIUM
EPSS-90.66% / 99.60%
||
7 Day CHG~0.00%
Published-04 Jan, 2018 | 13:00
Updated-06 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Action-Not Available
Vendor-Debian GNU/LinuxOracle CorporationSiemens AGNetApp, Inc.Intel CorporationCanonical Ltd.Arm Limited
Product-xeon_e3_1230_v3atom_x7-e3950xeon_e3_1505l_v6xeon_phidebian_linuxxeon_e3_1125c_v2xeon_e3_1245_v6xeon_e5_2623_v3xeon_e3_1271_v3xeon_e3_1275_v3xeon_e5_1650communications_diameter_signaling_routersimatic_winac_rtx_\(f\)_2010xeon_e3_1220xeon_e3_1265l_v4core_m5xeon_e5_2603_v4xeon_e5_2407_v2xeon_e3_1285_v4xeon_e5_2630lxeon_e5_2640_v2xeon_e3_1270xeon_e5_1660_v2xeon_e3_1245xeon_e3_1505l_v5xeon_e5_2648lxeon_e5_2450xeon_e5_2609_v2vm_virtualboxxeon_e5_2650xeon_e3_1290xeon_e5_2470_v2xeon_e5_2470xeon_e5_2450l_v2xeon_e5_2630l_v2xeon_e5_2637xeon_e3_1246_v3xeon_e5_2648l_v4xeon_e5_2637_v2xeon_e5_2418l_v3core_i5core_i7xeon_e3xeon_e3_1240_v5xeon_platinumcortex-axeon_e3_1125cxeon_e3_1285_v6xeon_e5_2608l_v4simatic_winac_rtx_\(f\)_firmwarexeon_e5_2643_v4xeon_e5_2650_v2xeon_e5_2650lxeon_e5_1620_v4xeon_e5_1650_v4xeon_e5_2420xeon_e5_2650l_v2xeon_e3_1220l_v3xeon_e3_1278l_v4xeon_e5_2608l_v3xeon_e5_1630_v3xeon_e3_1225xeon_e3_1220_v3xeon_e5_2428l_v2xeon_e7atom_x3xeon_e5_2430lxeon_e3_1275_v6xeon_e3_1275l_v3xeon_e5_1428l_v2xeon_e5_2618l_v2xeon_e5_1428l_v3xeon_e5_2620xeon_e5_1680_v3xeon_e3_1230l_v3xeon_e3_1240l_v3xeon_e3_1230_v5xeon_e5_1650_v2xeon_e5_2603_v2pentium_nxeon_e5_2620_v2xeon_e5_2630_v2xeon_e-1105cxeon_e5_1630_v4xeon_e3_1501m_v6xeon_e5_2407celeron_jxeon_e3_1231_v3xeon_e3_1240l_v5xeon_e3_1260l_v5xeon_e5_2643_v3xeon_e3_1268l_v3atom_zxeon_e5_2438l_v3xeon_e5_2420_v2pentium_jcore_m3xeon_e3_1270_v3xeon_e3_1240_v6xeon_e3_1285l_v4xeon_e3_1501l_v6xeon_e5_2630xeon_e3_1230_v2xeon_e3_1275xeon_e5_2418lxeon_e5_2628l_v3xeon_e3_1105c_v2xeon_e5_2648l_v2xeon_e3_1280_v2xeon_e5_2648l_v3core_i3xeon_e5_2618l_v3xeon_e3_1220_v5xeon_e5_2430_v2xeon_e3_1230_v6xeon_e5_2403_v2celeron_nxeon_e5_1660_v4xeon_e5_2450_v2xeon_e5_2440_v2ubuntu_linuxxeon_e5_2640_v4xeon_e5_2650_v4xeon_e3_1225_v3atom_x5-e3940xeon_e3_1260lxeon_e5_2448lxeon_e3_1235xeon_e5_2628l_v2xeon_e3_1230xeon_e3_1281_v3xeon_e5_1660xeon_e3_1245_v5xeon_e3_1270_v2xeon_e5_2620_v3xeon_e5_2650l_v3core_mxeon_e5_2440xeon_e5_2643_v2xeon_e3_12201atom_ehci_compute_nodexeon_e3_1225_v6xeon_e3_1270_v6xeon_e5_2623_v4xeon_e3_1285_v3xeon_e5xeon_e5_2640_v3xeon_e3_1235l_v5xeon_e5_2609solidfirexeon_e5_2609_v4xeon_e5_2609_v3atom_x5-e3930xeon_e3_12201_v2xeon_e3_1290_v2xeon_e3_1280_v3xeon_e5_2450lxeon_e5_1620_v3xeon_goldxeon_e3_1275_v5xeon_e5_2403xeon_e5_2620_v4xeon_e5_2628l_v4xeon_e5_2618l_v4atom_cxeon_e3_1225_v2xeon_e3_1240xeon_e3_1275_v2xeon_e5_2630l_v3xeon_e3_1220_v6xeon_bronze_3104xeon_e3_1270_v5xeon_e5_2603_v3xeon_bronze_3106xeonxeon_e3_1241_v3xeon_e3_1505m_v5xeon_e3_1220_v2xeon_e5_2430xeon_e3_1280_v6xeon_e3_1258l_v4xeon_e5_1650_v3xeon_e5_1428lxeon_silverxeon_e5_2428lxeon_e5_2630_v3xeon_e3_1225_v5xeon_e5_1620_v2xeon_e3_1245_v3xeon_e3_1268l_v5xeon_e5_2640xeon_e5_2418l_v2xeon_e5_2408l_v3xeon_e5_2430l_v2xeon_e5_2448l_v2xeon_e3_1276_v3xeon_e3_1265l_v3xeon_e5_2428l_v3xeon_e5_2650_v3xeon_e3_1280_v5xeon_e5_2630_v4xeon_e3_1280xeon_e3_1286l_v3xeon_e5_1680_v4xeon_e5_2637_v4xeon_e5_2630l_v4xeon_e5_2643xeon_e5_1620core_m7xeon_e3_1226_v3xeon_e3_1240_v2xeon_e3_1245_v2xeon_e5_2603xeon_e3_1286_v3xeon_e5_2637_v3xeon_e3_1265l_v2hci_management_nodexeon_e5_1660_v3xeon_e3_1285l_v3xeon_e3_1240_v3Microprocessors with Speculative Execution
CWE ID-CWE-203
Observable Discrepancy