Search for vulnerabilities
Vulnerability details: VCID-m669-5sqe-aaaq
Vulnerability ID VCID-m669-5sqe-aaaq
Aliases CVE-2017-5753
Summary
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual High http://nvidia.custhelp.com/app/answers/detail/a_id/4611
generic_textual High http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-5753.html
rhas Important https://access.redhat.com/errata/RHSA-2018:0010
rhas Important https://access.redhat.com/errata/RHSA-2018:0016
rhas Important https://access.redhat.com/errata/RHSA-2018:0017
rhas Important https://access.redhat.com/errata/RHSA-2018:0018
rhas Important https://access.redhat.com/errata/RHSA-2018:0020
rhas Important https://access.redhat.com/errata/RHSA-2018:0021
rhas Important https://access.redhat.com/errata/RHSA-2018:0022
rhas Important https://access.redhat.com/errata/RHSA-2018:0182
rhas Important https://access.redhat.com/errata/RHSA-2018:0292
rhas Important https://access.redhat.com/errata/RHSA-2018:0464
rhas Important https://access.redhat.com/errata/RHSA-2018:0496
rhas Important https://access.redhat.com/errata/RHSA-2018:0512
cvssv3 5.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json
epss 0.94074 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94074 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94074 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94124 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94124 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94167 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94167 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94167 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94167 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94167 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.9417 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.9417 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.9417 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.9417 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.9417 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.9417 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.9417 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.9417 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94277 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94304 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94304 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94332 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94332 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94332 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.94332 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.97542 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.97542 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
epss 0.97551 https://api.first.org/data/v1/epss?cve=CVE-2017-5753
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1519778
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
generic_textual Negligible https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
generic_textual Critical https://developer.arm.com/support/security-update
cvssv2 4.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.6 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
generic_textual Critical https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
archlinux High https://security.archlinux.org/AVG-557
archlinux High https://security.archlinux.org/AVG-558
archlinux High https://security.archlinux.org/AVG-559
archlinux High https://security.archlinux.org/AVG-578
archlinux High https://security.archlinux.org/AVG-579
archlinux High https://security.archlinux.org/AVG-584
archlinux High https://security.archlinux.org/AVG-987
generic_textual Critical https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
generic_textual Critical https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
generic_textual High https://spectreattack.com/
generic_textual Critical https://ubuntu.com/security/notices/USN-3516-1
generic_textual High https://ubuntu.com/security/notices/USN-3521-1
generic_textual High https://ubuntu.com/security/notices/USN-3530-1
generic_textual Critical https://ubuntu.com/security/notices/USN-3540-1
generic_textual Critical https://ubuntu.com/security/notices/USN-3540-2
generic_textual Critical https://ubuntu.com/security/notices/USN-3541-1
generic_textual Critical https://ubuntu.com/security/notices/USN-3541-2
generic_textual High https://ubuntu.com/security/notices/USN-3542-1
generic_textual High https://ubuntu.com/security/notices/USN-3542-2
generic_textual High https://ubuntu.com/security/notices/USN-3549-1
generic_textual High https://ubuntu.com/security/notices/USN-3580-1
generic_textual Critical https://ubuntu.com/security/notices/USN-3597-1
generic_textual Critical https://ubuntu.com/security/notices/USN-3597-2
generic_textual High https://webkitgtk.org/security/WSA-2018-0001.html
generic_textual Critical https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
generic_textual Critical http://www.amd.com/en/corporate/speculative-execution
Reference id Reference type URL
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-5753.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json
https://api.first.org/data/v1/epss?cve=CVE-2017-5753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
https://developer.arm.com/support/security-update
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
https://spectreattack.com/
https://ubuntu.com/security/notices/USN-3516-1
https://ubuntu.com/security/notices/USN-3521-1
https://ubuntu.com/security/notices/USN-3530-1
https://ubuntu.com/security/notices/USN-3540-1
https://ubuntu.com/security/notices/USN-3540-2
https://ubuntu.com/security/notices/USN-3541-1
https://ubuntu.com/security/notices/USN-3541-2
https://ubuntu.com/security/notices/USN-3542-1
https://ubuntu.com/security/notices/USN-3542-2
https://ubuntu.com/security/notices/USN-3549-1
https://ubuntu.com/security/notices/USN-3580-1
https://ubuntu.com/security/notices/USN-3597-1
https://ubuntu.com/security/notices/USN-3597-2
https://webkitgtk.org/security/WSA-2018-0001.html
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
http://www.amd.com/en/corporate/speculative-execution
1519778 https://bugzilla.redhat.com/show_bug.cgi?id=1519778
886852 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
AVG-557 https://security.archlinux.org/AVG-557
AVG-558 https://security.archlinux.org/AVG-558
AVG-559 https://security.archlinux.org/AVG-559
AVG-578 https://security.archlinux.org/AVG-578
AVG-579 https://security.archlinux.org/AVG-579
AVG-584 https://security.archlinux.org/AVG-584
AVG-987 https://security.archlinux.org/AVG-987
CVE-2017-5753;CVE-2017-5715 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c
CVE-2017-5753;CVE-2017-5715 Exploit https://spectreattack.com/spectre.pdf
RHSA-2018:0010 https://access.redhat.com/errata/RHSA-2018:0010
RHSA-2018:0016 https://access.redhat.com/errata/RHSA-2018:0016
RHSA-2018:0017 https://access.redhat.com/errata/RHSA-2018:0017
RHSA-2018:0018 https://access.redhat.com/errata/RHSA-2018:0018
RHSA-2018:0020 https://access.redhat.com/errata/RHSA-2018:0020
RHSA-2018:0021 https://access.redhat.com/errata/RHSA-2018:0021
RHSA-2018:0022 https://access.redhat.com/errata/RHSA-2018:0022
RHSA-2018:0182 https://access.redhat.com/errata/RHSA-2018:0182
RHSA-2018:0292 https://access.redhat.com/errata/RHSA-2018:0292
RHSA-2018:0464 https://access.redhat.com/errata/RHSA-2018:0464
RHSA-2018:0496 https://access.redhat.com/errata/RHSA-2018:0496
RHSA-2018:0512 https://access.redhat.com/errata/RHSA-2018:0512
USN-3516-1 https://usn.ubuntu.com/3516-1/
USN-3521-1 https://usn.ubuntu.com/3521-1/
USN-3530-1 https://usn.ubuntu.com/3530-1/
USN-3540-1 https://usn.ubuntu.com/3540-1/
USN-3540-2 https://usn.ubuntu.com/3540-2/
USN-3541-1 https://usn.ubuntu.com/3541-1/
USN-3541-2 https://usn.ubuntu.com/3541-2/
USN-3542-1 https://usn.ubuntu.com/3542-1/
USN-3542-2 https://usn.ubuntu.com/3542-2/
USN-3549-1 https://usn.ubuntu.com/3549-1/
USN-3580-1 https://usn.ubuntu.com/3580-1/
USN-3597-1 https://usn.ubuntu.com/3597-1/
USN-3597-2 https://usn.ubuntu.com/3597-2/
XSA-254 https://xenbits.xen.org/xsa/advisory-254.html
Data source Exploit-DB
Date added Jan. 4, 2018
Description Multiple CPUs - 'Spectre' Information Disclosure
Ransomware campaign use Unknown
Source publication date Jan. 3, 2018
Exploit type local
Platform multiple
Source update date Jan. 5, 2018
Source URL https://spectreattack.com/spectre.pdf
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.99895
EPSS Score 0.94074
Published At April 14, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.