Search for vulnerabilities
Vulnerability details: VCID-8rxw-pk3g-aaaf
Vulnerability ID VCID-8rxw-pk3g-aaaf
Aliases CVE-2017-5715
Summary
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
cvssv3.1 5.6 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
cvssv3.1 5.6 http://nvidia.custhelp.com/app/answers/detail/a_id/4609
ssvc Track http://nvidia.custhelp.com/app/answers/detail/a_id/4609
cvssv3.1 5.6 http://nvidia.custhelp.com/app/answers/detail/a_id/4611
ssvc Track http://nvidia.custhelp.com/app/answers/detail/a_id/4611
cvssv3.1 5.6 http://nvidia.custhelp.com/app/answers/detail/a_id/4613
ssvc Track http://nvidia.custhelp.com/app/answers/detail/a_id/4613
cvssv3.1 5.6 http://nvidia.custhelp.com/app/answers/detail/a_id/4614
ssvc Track http://nvidia.custhelp.com/app/answers/detail/a_id/4614
cvssv3.1 5.6 http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
ssvc Track http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
cvssv3.1 5.6 http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
ssvc Track http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
generic_textual High http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-5715.html
rhas Important https://access.redhat.com/errata/RHSA-2018:0016
rhas Important https://access.redhat.com/errata/RHSA-2018:0017
rhas Important https://access.redhat.com/errata/RHSA-2018:0018
rhas Important https://access.redhat.com/errata/RHSA-2018:0020
rhas Important https://access.redhat.com/errata/RHSA-2018:0021
rhas Important https://access.redhat.com/errata/RHSA-2018:0022
cvssv3.1 5.6 https://access.redhat.com/errata/RHSA-2018:0292
ssvc Track https://access.redhat.com/errata/RHSA-2018:0292
rhas Important https://access.redhat.com/errata/RHSA-2018:1129
rhas Important https://access.redhat.com/errata/RHSA-2018:1196
rhas Important https://access.redhat.com/errata/RHSA-2018:1216
rhas Important https://access.redhat.com/errata/RHSA-2018:1346
rhas Important https://access.redhat.com/errata/RHSA-2018:1967
cvssv3 5.6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
cvssv3.1 5.6 https://access.redhat.com/security/vulnerabilities/speculativeexecution
ssvc Track https://access.redhat.com/security/vulnerabilities/speculativeexecution
epss 0.90443 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90443 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90443 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90481 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90481 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90481 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9052 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9052 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90558 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90558 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90558 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90558 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90558 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90558 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90558 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90583 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90583 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90583 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90583 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90658 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90658 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90658 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90658 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90821 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90821 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90821 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9089 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9089 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9089 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9089 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9096 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9096 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9096 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9096 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.9096 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90982 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90982 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.90982 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.91016 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.91049 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.97469 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.97469 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.97515 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
epss 0.97515 https://api.first.org/data/v1/epss?cve=CVE-2017-5715
cvssv3.1 5.6 https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
ssvc Track https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
cvssv3.1 5.6 https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
ssvc Track https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
cvssv3.1 5.6 https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
ssvc Track https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
cvssv3.1 5.6 https://cert.vde.com/en-us/advisories/vde-2018-002
ssvc Track https://cert.vde.com/en-us/advisories/vde-2018-002
cvssv3.1 5.6 https://cert.vde.com/en-us/advisories/vde-2018-003
ssvc Track https://cert.vde.com/en-us/advisories/vde-2018-003
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
generic_textual Critical https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
generic_textual Negligible https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
cvssv3.1 5.6 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
ssvc Track https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
generic_textual Critical https://developer.arm.com/support/security-update
cvssv2 4.7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 7.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.6 https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
ssvc Track https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
generic_textual Critical https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
cvssv3.1 5.6 https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
ssvc Track https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
ssvc Track https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
ssvc Track https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
ssvc Track https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
ssvc Track https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
ssvc Track https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
ssvc Track https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
cvssv3.1 5.6 https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
ssvc Track https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
cvssv3.1 5.6 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
ssvc Track https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
cvssv3.1 5.6 https://seclists.org/bugtraq/2019/Jun/36
ssvc Track https://seclists.org/bugtraq/2019/Jun/36
cvssv3.1 5.6 https://seclists.org/bugtraq/2019/Nov/16
ssvc Track https://seclists.org/bugtraq/2019/Nov/16
archlinux High https://security.archlinux.org/AVG-557
archlinux High https://security.archlinux.org/AVG-558
archlinux High https://security.archlinux.org/AVG-559
archlinux High https://security.archlinux.org/AVG-578
archlinux High https://security.archlinux.org/AVG-579
archlinux High https://security.archlinux.org/AVG-582
archlinux High https://security.archlinux.org/AVG-583
archlinux High https://security.archlinux.org/AVG-584
archlinux High https://security.archlinux.org/AVG-987
cvssv3.1 5.6 https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
generic_textual Critical https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
ssvc Track https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
cvssv3.1 5.6 https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
ssvc Track https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
cvssv3.1 5.6 https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
ssvc Track https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
cvssv3.1 5.6 https://security.gentoo.org/glsa/201810-06
ssvc Track https://security.gentoo.org/glsa/201810-06
cvssv3.1 5.6 https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
generic_textual Critical https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
ssvc Track https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
cvssv3.1 5.6 https://security.netapp.com/advisory/ntap-20180104-0001/
ssvc Track https://security.netapp.com/advisory/ntap-20180104-0001/
cvssv3.1 5.6 https://security.paloaltonetworks.com/CVE-2017-5715
ssvc Track https://security.paloaltonetworks.com/CVE-2017-5715
cvssv3.1 5.6 https://spectreattack.com/
generic_textual High https://spectreattack.com/
ssvc Track https://spectreattack.com/
cvssv3.1 5.6 https://support.citrix.com/article/CTX231399
ssvc Track https://support.citrix.com/article/CTX231399
cvssv3.1 5.6 https://support.f5.com/csp/article/K91229003
ssvc Track https://support.f5.com/csp/article/K91229003
cvssv3.1 5.6 https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
ssvc Track https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
cvssv3.1 5.6 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
ssvc Track https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
cvssv3.1 5.6 https://support.lenovo.com/us/en/solutions/LEN-18282
ssvc Track https://support.lenovo.com/us/en/solutions/LEN-18282
cvssv3.1 5.6 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
ssvc Track https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
generic_textual Critical https://ubuntu.com/security/notices/USN-3516-1
generic_textual High https://ubuntu.com/security/notices/USN-3530-1
generic_textual High https://ubuntu.com/security/notices/USN-3531-1
generic_textual High https://ubuntu.com/security/notices/USN-3531-2
generic_textual High https://ubuntu.com/security/notices/USN-3531-3
generic_textual Critical https://ubuntu.com/security/notices/USN-3540-1
generic_textual Critical https://ubuntu.com/security/notices/USN-3540-2
generic_textual Critical https://ubuntu.com/security/notices/USN-3541-1
generic_textual Critical https://ubuntu.com/security/notices/USN-3541-2
generic_textual High https://ubuntu.com/security/notices/USN-3542-1
generic_textual High https://ubuntu.com/security/notices/USN-3542-2
generic_textual High https://ubuntu.com/security/notices/USN-3549-1
generic_textual High https://ubuntu.com/security/notices/USN-3560-1
generic_textual High https://ubuntu.com/security/notices/USN-3561-1
generic_textual High https://ubuntu.com/security/notices/USN-3580-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3581-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3581-2
generic_textual Medium https://ubuntu.com/security/notices/USN-3582-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3582-2
generic_textual High https://ubuntu.com/security/notices/USN-3594-1
generic_textual Critical https://ubuntu.com/security/notices/USN-3597-1
generic_textual Critical https://ubuntu.com/security/notices/USN-3597-2
generic_textual Medium https://ubuntu.com/security/notices/USN-3620-2
generic_textual High https://ubuntu.com/security/notices/USN-3690-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3777-3
cvssv3.1 5.6 https://usn.ubuntu.com/3531-1/
ssvc Track https://usn.ubuntu.com/3531-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3531-3/
ssvc Track https://usn.ubuntu.com/3531-3/
cvssv3.1 5.6 https://usn.ubuntu.com/3540-2/
ssvc Track https://usn.ubuntu.com/3540-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3541-2/
ssvc Track https://usn.ubuntu.com/3541-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3542-2/
ssvc Track https://usn.ubuntu.com/3542-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3549-1/
ssvc Track https://usn.ubuntu.com/3549-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3560-1/
ssvc Track https://usn.ubuntu.com/3560-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3561-1/
ssvc Track https://usn.ubuntu.com/3561-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3580-1/
ssvc Track https://usn.ubuntu.com/3580-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3581-1/
ssvc Track https://usn.ubuntu.com/3581-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3581-2/
ssvc Track https://usn.ubuntu.com/3581-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3582-1/
ssvc Track https://usn.ubuntu.com/3582-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3582-2/
ssvc Track https://usn.ubuntu.com/3582-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3594-1/
ssvc Track https://usn.ubuntu.com/3594-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3597-1/
ssvc Track https://usn.ubuntu.com/3597-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3597-2/
ssvc Track https://usn.ubuntu.com/3597-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3620-2/
ssvc Track https://usn.ubuntu.com/3620-2/
cvssv3.1 5.6 https://usn.ubuntu.com/3690-1/
ssvc Track https://usn.ubuntu.com/3690-1/
cvssv3.1 5.6 https://usn.ubuntu.com/3777-3/
ssvc Track https://usn.ubuntu.com/3777-3/
cvssv3.1 5.6 https://usn.ubuntu.com/usn/usn-3516-1/
ssvc Track https://usn.ubuntu.com/usn/usn-3516-1/
generic_textual High https://webkitgtk.org/security/WSA-2018-0001.html
generic_textual Critical https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
cvssv3.1 5.6 https://www.debian.org/security/2018/dsa-4120
ssvc Track https://www.debian.org/security/2018/dsa-4120
cvssv3.1 5.6 https://www.debian.org/security/2018/dsa-4187
ssvc Track https://www.debian.org/security/2018/dsa-4187
cvssv3.1 5.6 https://www.debian.org/security/2018/dsa-4188
ssvc Track https://www.debian.org/security/2018/dsa-4188
cvssv3.1 5.6 https://www.debian.org/security/2018/dsa-4213
ssvc Track https://www.debian.org/security/2018/dsa-4213
cvssv3.1 5.6 https://www.exploit-db.com/exploits/43427/
ssvc Track https://www.exploit-db.com/exploits/43427/
cvssv3.1 5.6 https://www.kb.cert.org/vuls/id/180049
ssvc Track https://www.kb.cert.org/vuls/id/180049
cvssv3.1 5.6 https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
ssvc Track https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
cvssv3.1 5.6 https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
ssvc Track https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
generic_textual High https://www.qemu.org/2018/01/04/spectre/
generic_textual High https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/
cvssv3.1 5.6 https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
ssvc Track https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
cvssv3.1 5.6 https://www.synology.com/support/security/Synology_SA_18_01
ssvc Track https://www.synology.com/support/security/Synology_SA_18_01
cvssv3.1 5.6 https://www.vmware.com/security/advisories/VMSA-2018-0007.html
ssvc Track https://www.vmware.com/security/advisories/VMSA-2018-0007.html
cvssv3.1 5.6 https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
ssvc Track https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
cvssv3.1 5.6 https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
ssvc Track https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
generic_textual Critical http://www.amd.com/en/corporate/speculative-execution
cvssv3.1 5.6 http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
ssvc Track http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
cvssv3.1 5.6 http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
ssvc Track http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
cvssv3.1 5.6 http://www.kb.cert.org/vuls/id/584653
ssvc Track http://www.kb.cert.org/vuls/id/584653
cvssv3.1 5.6 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
ssvc Track http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
cvssv3.1 5.6 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
ssvc Track http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
cvssv3.1 5.6 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
ssvc Track http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
cvssv3.1 5.6 http://www.securityfocus.com/bid/102376
ssvc Track http://www.securityfocus.com/bid/102376
cvssv3.1 5.6 http://www.securitytracker.com/id/1040071
ssvc Track http://www.securitytracker.com/id/1040071
cvssv3.1 5.6 http://xenbits.xen.org/xsa/advisory-254.html
ssvc Track http://xenbits.xen.org/xsa/advisory-254.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-5715.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
https://api.first.org/data/v1/epss?cve=CVE-2017-5715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
https://developer.arm.com/support/security-update
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
https://spectreattack.com/
https://ubuntu.com/security/notices/USN-3516-1
https://ubuntu.com/security/notices/USN-3530-1
https://ubuntu.com/security/notices/USN-3531-1
https://ubuntu.com/security/notices/USN-3531-2
https://ubuntu.com/security/notices/USN-3531-3
https://ubuntu.com/security/notices/USN-3540-1
https://ubuntu.com/security/notices/USN-3540-2
https://ubuntu.com/security/notices/USN-3541-1
https://ubuntu.com/security/notices/USN-3541-2
https://ubuntu.com/security/notices/USN-3542-1
https://ubuntu.com/security/notices/USN-3542-2
https://ubuntu.com/security/notices/USN-3549-1
https://ubuntu.com/security/notices/USN-3560-1
https://ubuntu.com/security/notices/USN-3561-1
https://ubuntu.com/security/notices/USN-3580-1
https://ubuntu.com/security/notices/USN-3581-1
https://ubuntu.com/security/notices/USN-3581-2
https://ubuntu.com/security/notices/USN-3582-1
https://ubuntu.com/security/notices/USN-3582-2
https://ubuntu.com/security/notices/USN-3594-1
https://ubuntu.com/security/notices/USN-3597-1
https://ubuntu.com/security/notices/USN-3597-2
https://ubuntu.com/security/notices/USN-3620-2
https://ubuntu.com/security/notices/USN-3690-1
https://ubuntu.com/security/notices/USN-3777-3
https://webkitgtk.org/security/WSA-2018-0001.html
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
https://www.qemu.org/2018/01/04/spectre/
https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/
http://www.amd.com/en/corporate/speculative-execution
102376 http://www.securityfocus.com/bid/102376
1040071 http://www.securitytracker.com/id/1040071
180049 https://www.kb.cert.org/vuls/id/180049
43427 https://www.exploit-db.com/exploits/43427/
4609 http://nvidia.custhelp.com/app/answers/detail/a_id/4609
4613 http://nvidia.custhelp.com/app/answers/detail/a_id/4613
4614 http://nvidia.custhelp.com/app/answers/detail/a_id/4614
584653 http://www.kb.cert.org/vuls/id/584653
886532 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532
ADV180002 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
advisory-254.html http://xenbits.xen.org/xsa/advisory-254.html
ARUBA-PSA-2018-001.txt http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
ASA-201801-10 https://security.archlinux.org/ASA-201801-10
AVG-557 https://security.archlinux.org/AVG-557
AVG-558 https://security.archlinux.org/AVG-558
AVG-559 https://security.archlinux.org/AVG-559
AVG-578 https://security.archlinux.org/AVG-578
AVG-579 https://security.archlinux.org/AVG-579
AVG-582 https://security.archlinux.org/AVG-582
AVG-583 https://security.archlinux.org/AVG-583
AVG-584 https://security.archlinux.org/AVG-584
AVG-987 https://security.archlinux.org/AVG-987
AWS-2018-013 https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
cisco-sa-20180104-cpusidechannel https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
CTX231399 https://support.citrix.com/article/CTX231399
CVE-2017-5715 https://security.paloaltonetworks.com/CVE-2017-5715
display?docId=emr_na-hpesbhf03805en_us https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
FreeBSD-SA-18:03.speculative_execution.asc https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
GLSA-201804-08 https://security.gentoo.org/glsa/201804-08
K91229003 https://support.f5.com/csp/article/K91229003
LEN-18282 https://support.lenovo.com/us/en/solutions/LEN-18282
mitel-product-security-advisory-18-0001 https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
mitigations-landing-new-class-timing-attack https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
msg00002.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
msg00003.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
msg00004.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
msg00005.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
msg00009.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
msg00012.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
msg00013.html http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
msg00017.html https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
msg00019.html https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
msg00025.html https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
ntap-20180104-0001 https://security.netapp.com/advisory/ntap-20180104-0001/
reading-privileged-memory-with-side.html https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
RHBA-2018:0042 https://bugzilla.redhat.com/show_bug.cgi?id=1519780
RHSA-2018:0016 https://access.redhat.com/errata/RHSA-2018:0016
RHSA-2018:0017 https://access.redhat.com/errata/RHSA-2018:0017
RHSA-2018:0018 https://access.redhat.com/errata/RHSA-2018:0018
RHSA-2018:0020 https://access.redhat.com/errata/RHSA-2018:0020
RHSA-2018:0021 https://access.redhat.com/errata/RHSA-2018:0021
RHSA-2018:0022 https://access.redhat.com/errata/RHSA-2018:0022
RHSA-2018:0023 https://access.redhat.com/errata/RHSA-2018:0023
RHSA-2018:0027 https://access.redhat.com/errata/RHSA-2018:0027
RHSA-2018:0028 https://access.redhat.com/errata/RHSA-2018:0028
RHSA-2018:0292 https://access.redhat.com/errata/RHSA-2018:0292
RHSA-2018:1129 https://access.redhat.com/errata/RHSA-2018:1129
RHSA-2018:1196 https://access.redhat.com/errata/RHSA-2018:1196
RHSA-2018:1216 https://access.redhat.com/errata/RHSA-2018:1216
RHSA-2018:1346 https://access.redhat.com/errata/RHSA-2018:1346
RHSA-2018:1967 https://access.redhat.com/errata/RHSA-2018:1967
Spectre-Information-Disclosure-Proof-Of-Concept.html http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
speculativeexecution https://access.redhat.com/security/vulnerabilities/speculativeexecution
suse-addresses-meltdown-spectre-vulnerabilities https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Synology_SA_18_01 https://www.synology.com/support/security/Synology_SA_18_01
usn-3516-1 https://usn.ubuntu.com/usn/usn-3516-1/
USN-3516-1 https://usn.ubuntu.com/3516-1/
USN-3530-1 https://usn.ubuntu.com/3530-1/
USN-3531-1 https://usn.ubuntu.com/3531-1/
USN-3531-3 https://usn.ubuntu.com/3531-3/
USN-3540-1 https://usn.ubuntu.com/3540-1/
USN-3540-2 https://usn.ubuntu.com/3540-2/
USN-3541-1 https://usn.ubuntu.com/3541-1/
USN-3541-2 https://usn.ubuntu.com/3541-2/
USN-3542-1 https://usn.ubuntu.com/3542-1/
USN-3542-2 https://usn.ubuntu.com/3542-2/
USN-3549-1 https://usn.ubuntu.com/3549-1/
USN-3560-1 https://usn.ubuntu.com/3560-1/
USN-3561-1 https://usn.ubuntu.com/3561-1/
USN-3580-1 https://usn.ubuntu.com/3580-1/
USN-3594-1 https://usn.ubuntu.com/3594-1/
USN-3597-1 https://usn.ubuntu.com/3597-1/
USN-3597-2 https://usn.ubuntu.com/3597-2/
USN-3690-1 https://usn.ubuntu.com/3690-1/
vde-2018-002 https://cert.vde.com/en-us/advisories/vde-2018-002
vde-2018-003 https://cert.vde.com/en-us/advisories/vde-2018-003
VMSA-2018-0002.html https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
VMSA-2018-0004.html https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
VMSA-2018-0007.html https://www.vmware.com/security/advisories/VMSA-2018-0007.html
XSA-254 https://xenbits.xen.org/xsa/advisory-254.html
Data source Exploit-DB
Date added Jan. 4, 2018
Description Multiple CPUs - 'Spectre' Information Disclosure
Ransomware campaign use Unknown
Source publication date Jan. 3, 2018
Exploit type local
Platform multiple
Source update date Jan. 5, 2018
Source URL https://spectreattack.com/spectre.pdf
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2018:0292
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://access.redhat.com/errata/RHSA-2018:0292
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://access.redhat.com/security/vulnerabilities/speculativeexecution
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://access.redhat.com/security/vulnerabilities/speculativeexecution
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://cert.vde.com/en-us/advisories/vde-2018-002
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://cert.vde.com/en-us/advisories/vde-2018-002
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://cert.vde.com/en-us/advisories/vde-2018-003
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://cert.vde.com/en-us/advisories/vde-2018-003
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://seclists.org/bugtraq/2019/Jun/36
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://seclists.org/bugtraq/2019/Jun/36
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://seclists.org/bugtraq/2019/Nov/16
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://seclists.org/bugtraq/2019/Nov/16
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.gentoo.org/glsa/201810-06
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.gentoo.org/glsa/201810-06
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20180104-0001/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.netapp.com/advisory/ntap-20180104-0001/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://security.paloaltonetworks.com/CVE-2017-5715
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://security.paloaltonetworks.com/CVE-2017-5715
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://spectreattack.com/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://spectreattack.com/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://support.citrix.com/article/CTX231399
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://support.citrix.com/article/CTX231399
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://support.f5.com/csp/article/K91229003
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://support.f5.com/csp/article/K91229003
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://support.lenovo.com/us/en/solutions/LEN-18282
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://support.lenovo.com/us/en/solutions/LEN-18282
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3531-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3531-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3531-3/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3531-3/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3540-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3540-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3541-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3541-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3542-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3542-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3549-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3549-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3560-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3560-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3561-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3561-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3580-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3580-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3581-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3581-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3581-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3581-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3582-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3582-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3582-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3582-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3594-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3594-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3597-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3597-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3597-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3597-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3620-2/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3620-2/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3690-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3690-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/3777-3/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/3777-3/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://usn.ubuntu.com/usn/usn-3516-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://usn.ubuntu.com/usn/usn-3516-1/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.debian.org/security/2018/dsa-4120
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.debian.org/security/2018/dsa-4120
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.debian.org/security/2018/dsa-4187
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.debian.org/security/2018/dsa-4187
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.debian.org/security/2018/dsa-4188
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.debian.org/security/2018/dsa-4188
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.debian.org/security/2018/dsa-4213
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.debian.org/security/2018/dsa-4213
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.exploit-db.com/exploits/43427/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.exploit-db.com/exploits/43427/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.kb.cert.org/vuls/id/180049
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.kb.cert.org/vuls/id/180049
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.synology.com/support/security/Synology_SA_18_01
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.synology.com/support/security/Synology_SA_18_01
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.kb.cert.org/vuls/id/584653
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.kb.cert.org/vuls/id/584653
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.securityfocus.com/bid/102376
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.securityfocus.com/bid/102376
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://www.securitytracker.com/id/1040071
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://www.securitytracker.com/id/1040071
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at http://xenbits.xen.org/xsa/advisory-254.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/ Found at http://xenbits.xen.org/xsa/advisory-254.html
Exploit Prediction Scoring System (EPSS)
Percentile 0.99557
EPSS Score 0.90443
Published At April 15, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.