Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-v8fp-rzfq-e3bs
Vulnerability ID VCID-v8fp-rzfq-e3bs
Aliases CVE-2017-5715
Summary Information leak via side effects of speculative execution
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
cvssv3.1 5.6 http://nvidia.custhelp.com/app/answers/detail/a_id/4609
ssvc Track http://nvidia.custhelp.com/app/answers/detail/a_id/4609
cvssv3.1 5.6 http://nvidia.custhelp.com/app/answers/detail/a_id/4611
ssvc Track http://nvidia.custhelp.com/app/answers/detail/a_id/4611
cvssv3.1 5.6 http://nvidia.custhelp.com/app/answers/detail/a_id/4613
ssvc Track http://nvidia.custhelp.com/app/answers/detail/a_id/4613
cvssv3.1 5.6 http://nvidia.custhelp.com/app/answers/detail/a_id/4614
ssvc Track http://nvidia.custhelp.com/app/answers/detail/a_id/4614
cvssv3.1 5.6 http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
ssvc Track http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
cvssv3.1 5.6 http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
ssvc Track http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
cvssv3.1 5.6 https://access.redhat.com/errata/RHSA-2018:0292
ssvc Track https://access.redhat.com/errata/RHSA-2018:0292
cvssv3 5.6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
cvssv3.1 5.6 https://access.redhat.com/security/vulnerabilities/speculativeexecution
ssvc Track https://access.redhat.com/security/vulnerabilities/speculativeexecution
epss 0.88597 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.88597 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.89042 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.89094 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.89094 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.89094 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.89094 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.89147 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.89198 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.89198 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.89198 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.89198 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
cvssv3.1 5.6 https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
ssvc Track https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
cvssv3.1 5.6 https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
ssvc Track https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
cvssv3.1 5.6 https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
ssvc Track https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
cvssv3.1 5.6 https://cert.vde.com/en-us/advisories/vde-2018-002
ssvc Track https://cert.vde.com/en-us/advisories/vde-2018-002
cvssv3.1 5.6 https://cert.vde.com/en-us/advisories/vde-2018-003
ssvc Track https://cert.vde.com/en-us/advisories/vde-2018-003
cvssv3.1 5.6 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
ssvc Track https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
cvssv2 4.7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 7.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.6 https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
ssvc Track https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
cvssv3.1 5.6 https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
ssvc Track https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
ssvc Track https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
ssvc Track https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
ssvc Track https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
ssvc Track https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
ssvc Track https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
ssvc Track https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
ssvc Track https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
cvssv3.1 5.6 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
ssvc Track https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
cvssv3.1 5.6 https://seclists.org/bugtraq/2019/Jun/36
ssvc Track https://seclists.org/bugtraq/2019/Jun/36
cvssv3.1 5.6 https://seclists.org/bugtraq/2019/Nov/16
ssvc Track https://seclists.org/bugtraq/2019/Nov/16
archlinux High https://security.archlinux.org/AVG-557
archlinux High https://security.archlinux.org/AVG-558
archlinux High https://security.archlinux.org/AVG-559
archlinux High https://security.archlinux.org/AVG-582
archlinux High https://security.archlinux.org/AVG-583
archlinux High https://security.archlinux.org/AVG-987
cvssv3.1 5.6 https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
ssvc Track https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
cvssv3.1 5.6 https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
ssvc Track https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
cvssv3.1 5.6 https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
ssvc Track https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
cvssv3.1 5.6 https://security.gentoo.org/glsa/201810-06
ssvc Track https://security.gentoo.org/glsa/201810-06
cvssv3.1 5.6 https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
ssvc Track https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
cvssv3.1 5.6 https://security.netapp.com/advisory/ntap-20180104-0001/
ssvc Track https://security.netapp.com/advisory/ntap-20180104-0001/
cvssv3.1 5.6 https://security.paloaltonetworks.com/CVE-2017-5715
ssvc Track https://security.paloaltonetworks.com/CVE-2017-5715
cvssv3.1 5.6 https://spectreattack.com/
ssvc Track https://spectreattack.com/
cvssv3.1 5.6 https://support.citrix.com/article/CTX231399
ssvc Track https://support.citrix.com/article/CTX231399
cvssv3.1 5.6 https://support.f5.com/csp/article/K91229003
ssvc Track https://support.f5.com/csp/article/K91229003
cvssv3.1 5.6 https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
ssvc Track https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
cvssv3.1 5.6 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
ssvc Track https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
cvssv3.1 5.6 https://support.lenovo.com/us/en/solutions/LEN-18282
ssvc Track https://support.lenovo.com/us/en/solutions/LEN-18282
cvssv3.1 5.6 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
ssvc Track https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
cvssv3.1 5.6 https://usn.ubuntu.com/3531-1/
ssvc Track https://usn.ubuntu.com/3531-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3531-3/
ssvc Track https://usn.ubuntu.com/3531-3/
cvssv3.1 5.6 https://usn.ubuntu.com/3540-2/
ssvc Track https://usn.ubuntu.com/3540-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3541-2/
ssvc Track https://usn.ubuntu.com/3541-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3542-2/
ssvc Track https://usn.ubuntu.com/3542-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3549-1/
ssvc Track https://usn.ubuntu.com/3549-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3560-1/
ssvc Track https://usn.ubuntu.com/3560-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3561-1/
ssvc Track https://usn.ubuntu.com/3561-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3580-1/
ssvc Track https://usn.ubuntu.com/3580-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3581-1/
ssvc Track https://usn.ubuntu.com/3581-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3581-2/
ssvc Track https://usn.ubuntu.com/3581-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3582-1/
ssvc Track https://usn.ubuntu.com/3582-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3582-2/
ssvc Track https://usn.ubuntu.com/3582-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3594-1/
ssvc Track https://usn.ubuntu.com/3594-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3597-1/
ssvc Track https://usn.ubuntu.com/3597-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3597-2/
ssvc Track https://usn.ubuntu.com/3597-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3620-2/
ssvc Track https://usn.ubuntu.com/3620-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3690-1/
ssvc Track https://usn.ubuntu.com/3690-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3777-3/
ssvc Track https://usn.ubuntu.com/3777-3/
cvssv3.1 5.6 https://usn.ubuntu.com/usn/usn-3516-1/
ssvc Track https://usn.ubuntu.com/usn/usn-3516-1/
cvssv3.1 5.6 https://www.debian.org/security/2018/dsa-4120
ssvc Track https://www.debian.org/security/2018/dsa-4120
cvssv3.1 5.6 https://www.debian.org/security/2018/dsa-4187
ssvc Track https://www.debian.org/security/2018/dsa-4187
cvssv3.1 5.6 https://www.debian.org/security/2018/dsa-4188
ssvc Track https://www.debian.org/security/2018/dsa-4188
cvssv3.1 5.6 https://www.debian.org/security/2018/dsa-4213
ssvc Track https://www.debian.org/security/2018/dsa-4213
cvssv3.1 5.6 https://www.exploit-db.com/exploits/43427/
ssvc Track https://www.exploit-db.com/exploits/43427/
cvssv3.1 5.6 https://www.kb.cert.org/vuls/id/180049
ssvc Track https://www.kb.cert.org/vuls/id/180049
cvssv3.1 5.6 https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
ssvc Track https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
cvssv3.1 5.6 https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
ssvc Track https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
cvssv3.1 5.6 https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
ssvc Track https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
cvssv3.1 5.6 https://www.synology.com/support/security/Synology_SA_18_01
ssvc Track https://www.synology.com/support/security/Synology_SA_18_01
cvssv3.1 5.6 https://www.vmware.com/security/advisories/VMSA-2018-0007.html
ssvc Track https://www.vmware.com/security/advisories/VMSA-2018-0007.html
cvssv3.1 5.6 https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
ssvc Track https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
cvssv3.1 5.6 https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
ssvc Track https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
cvssv3.1 5.6 http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
ssvc Track http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
cvssv3.1 5.6 http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
ssvc Track http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
cvssv3.1 5.6 http://www.kb.cert.org/vuls/id/584653
ssvc Track http://www.kb.cert.org/vuls/id/584653
cvssv3.1 5.6 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
ssvc Track http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
cvssv3.1 5.6 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
ssvc Track http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
cvssv3.1 5.6 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
ssvc Track http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
cvssv3.1 5.6 http://www.securityfocus.com/bid/102376
ssvc Track http://www.securityfocus.com/bid/102376
cvssv3.1 5.6 http://www.securitytracker.com/id/1040071
ssvc Track http://www.securitytracker.com/id/1040071
cvssv3.1 5.6 http://xenbits.xen.org/xsa/advisory-254.html
ssvc Track http://xenbits.xen.org/xsa/advisory-254.html
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
https://api.first.org/data/v1/epss?cve=CVE-2017-5715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
102376 http://www.securityfocus.com/bid/102376
1040071 http://www.securitytracker.com/id/1040071
1519780 https://bugzilla.redhat.com/show_bug.cgi?id=1519780
180049 https://www.kb.cert.org/vuls/id/180049
36 https://seclists.org/bugtraq/2019/Jun/36
43427 https://www.exploit-db.com/exploits/43427/
4609 http://nvidia.custhelp.com/app/answers/detail/a_id/4609
4611 http://nvidia.custhelp.com/app/answers/detail/a_id/4611
4613 http://nvidia.custhelp.com/app/answers/detail/a_id/4613
4614 http://nvidia.custhelp.com/app/answers/detail/a_id/4614
584653 http://www.kb.cert.org/vuls/id/584653
886532 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532
886852 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
ADV180002 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
advisory-254.html http://xenbits.xen.org/xsa/advisory-254.html
advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
ARUBA-PSA-2018-001.txt http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
ARUBA-PSA-2019-003.txt http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
ASA-201801-10 https://security.archlinux.org/ASA-201801-10
AVG-557 https://security.archlinux.org/AVG-557
AVG-558 https://security.archlinux.org/AVG-558
AVG-559 https://security.archlinux.org/AVG-559
AVG-582 https://security.archlinux.org/AVG-582
AVG-583 https://security.archlinux.org/AVG-583
AVG-987 https://security.archlinux.org/AVG-987
AWS-2018-013 https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
cisco-sa-20180104-cpusidechannel https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
CTX231399 https://support.citrix.com/article/CTX231399
CVE-2017-5715 https://security.paloaltonetworks.com/CVE-2017-5715
CVE-2017-5753;CVE-2017-5715 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c
CVE-2017-5753;CVE-2017-5715 Exploit https://spectreattack.com/spectre.pdf
display?docId=emr_na-hpesbhf03805en_us https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
FreeBSD-SA-18:03.speculative_execution.asc https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
GLSA-201804-08 https://security.gentoo.org/glsa/201804-08
GLSA-201810-06 https://security.gentoo.org/glsa/201810-06
K91229003 https://support.f5.com/csp/article/K91229003
LEN-18282 https://support.lenovo.com/us/en/solutions/LEN-18282
mitel-product-security-advisory-18-0001 https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
mitigations-landing-new-class-timing-attack https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
msg00002.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
msg00003.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
msg00004.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
msg00005.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
msg00009.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
msg00012.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
msg00013.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
msg00017.html https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
msg00019.html https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
msg00025.html https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
ntap-20180104-0001 https://security.netapp.com/advisory/ntap-20180104-0001/
reading-privileged-memory-with-side.html https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
RHSA-2018:0016 https://access.redhat.com/errata/RHSA-2018:0016
RHSA-2018:0017 https://access.redhat.com/errata/RHSA-2018:0017
RHSA-2018:0018 https://access.redhat.com/errata/RHSA-2018:0018
RHSA-2018:0020 https://access.redhat.com/errata/RHSA-2018:0020
RHSA-2018:0021 https://access.redhat.com/errata/RHSA-2018:0021
RHSA-2018:0022 https://access.redhat.com/errata/RHSA-2018:0022
RHSA-2018:0023 https://access.redhat.com/errata/RHSA-2018:0023
RHSA-2018:0027 https://access.redhat.com/errata/RHSA-2018:0027
RHSA-2018:0028 https://access.redhat.com/errata/RHSA-2018:0028
RHSA-2018:0292 https://access.redhat.com/errata/RHSA-2018:0292
RHSA-2018:1062 https://access.redhat.com/errata/RHSA-2018:1062
RHSA-2018:1129 https://access.redhat.com/errata/RHSA-2018:1129
RHSA-2018:1130 https://access.redhat.com/errata/RHSA-2018:1130
RHSA-2018:1196 https://access.redhat.com/errata/RHSA-2018:1196
RHSA-2018:1216 https://access.redhat.com/errata/RHSA-2018:1216
RHSA-2018:1252 https://access.redhat.com/errata/RHSA-2018:1252
RHSA-2018:1319 https://access.redhat.com/errata/RHSA-2018:1319
RHSA-2018:1346 https://access.redhat.com/errata/RHSA-2018:1346
RHSA-2018:1967 https://access.redhat.com/errata/RHSA-2018:1967
spectreattack.com https://spectreattack.com/
Spectre-Information-Disclosure-Proof-Of-Concept.html http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
speculativeexecution https://access.redhat.com/security/vulnerabilities/speculativeexecution
speculative-processor-vulnerability https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
ssa-608355.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
suse-addresses-meltdown-spectre-vulnerabilities https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Synology_SA_18_01 https://www.synology.com/support/security/Synology_SA_18_01
todays-cpu-vulnerability-what-you-need.html https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
usn-3516-1 https://usn.ubuntu.com/usn/usn-3516-1/
USN-3516-1 https://usn.ubuntu.com/3516-1/
USN-3530-1 https://usn.ubuntu.com/3530-1/
USN-3531-1 https://usn.ubuntu.com/3531-1/
USN-3531-3 https://usn.ubuntu.com/3531-3/
USN-3540-1 https://usn.ubuntu.com/3540-1/
USN-3540-2 https://usn.ubuntu.com/3540-2/
USN-3541-1 https://usn.ubuntu.com/3541-1/
USN-3541-2 https://usn.ubuntu.com/3541-2/
USN-3542-1 https://usn.ubuntu.com/3542-1/
USN-3542-2 https://usn.ubuntu.com/3542-2/
USN-3549-1 https://usn.ubuntu.com/3549-1/
USN-3560-1 https://usn.ubuntu.com/3560-1/
USN-3561-1 https://usn.ubuntu.com/3561-1/
USN-3580-1 https://usn.ubuntu.com/3580-1/
USN-3581-1 https://usn.ubuntu.com/3581-1/
USN-3581-2 https://usn.ubuntu.com/3581-2/
USN-3582-1 https://usn.ubuntu.com/3582-1/
USN-3582-2 https://usn.ubuntu.com/3582-2/
USN-3594-1 https://usn.ubuntu.com/3594-1/
USN-3597-1 https://usn.ubuntu.com/3597-1/
USN-3597-2 https://usn.ubuntu.com/3597-2/
USN-3620-2 https://usn.ubuntu.com/3620-2/
USN-3690-1 https://usn.ubuntu.com/3690-1/
USN-3777-3 https://usn.ubuntu.com/3777-3/
vde-2018-002 https://cert.vde.com/en-us/advisories/vde-2018-002
vde-2018-003 https://cert.vde.com/en-us/advisories/vde-2018-003
VMSA-2018-0002.html https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
VMSA-2018-0004.html https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
VMSA-2018-0007.html https://www.vmware.com/security/advisories/VMSA-2018-0007.html
XSA-254 https://xenbits.xen.org/xsa/advisory-254.html
Data source Exploit-DB
Date added Jan. 4, 2018
Description Multiple CPUs - 'Spectre' Information Disclosure
Ransomware campaign use Unknown
Source publication date Jan. 3, 2018
Exploit type local
Platform multiple
Source update date Jan. 5, 2018
Source URL https://spectreattack.com/spectre.pdf
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2018:0292
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://access.redhat.com/errata/RHSA-2018:0292
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://access.redhat.com/security/vulnerabilities/speculativeexecution
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://access.redhat.com/security/vulnerabilities/speculativeexecution
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://cert.vde.com/en-us/advisories/vde-2018-002
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://cert.vde.com/en-us/advisories/vde-2018-002
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://cert.vde.com/en-us/advisories/vde-2018-003
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://cert.vde.com/en-us/advisories/vde-2018-003
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://seclists.org/bugtraq/2019/Jun/36
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://seclists.org/bugtraq/2019/Jun/36
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://seclists.org/bugtraq/2019/Nov/16
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://seclists.org/bugtraq/2019/Nov/16
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.gentoo.org/glsa/201810-06
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.gentoo.org/glsa/201810-06
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20180104-0001/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.netapp.com/advisory/ntap-20180104-0001/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.paloaltonetworks.com/CVE-2017-5715
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.paloaltonetworks.com/CVE-2017-5715
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://spectreattack.com/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://spectreattack.com/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://support.citrix.com/article/CTX231399
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://support.citrix.com/article/CTX231399
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://support.f5.com/csp/article/K91229003
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://support.f5.com/csp/article/K91229003
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://support.lenovo.com/us/en/solutions/LEN-18282
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://support.lenovo.com/us/en/solutions/LEN-18282
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3531-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3531-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3531-3/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3531-3/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3540-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3540-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3541-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3541-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3542-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3542-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3549-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3549-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3560-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3560-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3561-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3561-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3580-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3580-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3581-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3581-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3581-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3581-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3582-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3582-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3582-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3582-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3594-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3594-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3597-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3597-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3597-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3597-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3620-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3620-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3690-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3690-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3777-3/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3777-3/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/usn/usn-3516-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/usn/usn-3516-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.debian.org/security/2018/dsa-4120
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.debian.org/security/2018/dsa-4120
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.debian.org/security/2018/dsa-4187
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.debian.org/security/2018/dsa-4187
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.debian.org/security/2018/dsa-4188
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.debian.org/security/2018/dsa-4188
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.debian.org/security/2018/dsa-4213
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.debian.org/security/2018/dsa-4213
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.exploit-db.com/exploits/43427/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.exploit-db.com/exploits/43427/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.kb.cert.org/vuls/id/180049
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.kb.cert.org/vuls/id/180049
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.synology.com/support/security/Synology_SA_18_01
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.synology.com/support/security/Synology_SA_18_01
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.kb.cert.org/vuls/id/584653
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.kb.cert.org/vuls/id/584653
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.securityfocus.com/bid/102376
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.securityfocus.com/bid/102376
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.securitytracker.com/id/1040071
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.securitytracker.com/id/1040071
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://xenbits.xen.org/xsa/advisory-254.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://xenbits.xen.org/xsa/advisory-254.html
Exploit Prediction Scoring System (EPSS)
Percentile 0.995
EPSS Score 0.88597
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:37:50.377900+00:00 Xen Importer Import https://xenbits.xen.org/xsa/advisory-254.html 38.0.0