National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2018-3693 Detail

Current Description

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

Source:  MITRE
Description Last Modified:  07/10/2018
View Analysis Description

Impact

CVSS v3.0 Severity and Metrics:

Base Score: 5.6 MEDIUM
Vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N (V3 legend)
Impact Score: 4.0
Exploitability Score: 1.1


Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope (S): Changed
Confidentiality (C): High
Integrity (I): None
Availability (A): None

CVSS v2.0 Severity and Metrics:

Base Score: 4.7 MEDIUM
Vector: (AV:L/AC:M/Au:N/C:C/I:N/A:N) (V2 legend)
Impact Subscore: 6.9
Exploitability Subscore: 3.4


Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (AU): None
Confidentiality (C): Complete
Integrity (I): None
Availability (A): None
Additional Information:
Allows unauthorized disclosure of information

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://01.org/security/advisories/intel-oss-10002 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2384
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2395
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://security.netapp.com/advisory/ntap-20180823-0001/
https://thehackernews.com/2018/07/intel-spectre-vulnerability.html Third Party Advisory
https://www.suse.com/support/kb/doc/?id=7023075 Third Party Advisory

Technical Details

Vulnerability Type (View All)

  • Information Leak / Disclosure (CWE-200)

Vulnerable software and versions Switch to CPE 2.3

Configuration 1
OR
cpe:/h:intel:atom_c:c2308
cpe:/h:intel:atom_c:c2316
cpe:/h:intel:atom_c:c2338
cpe:/h:intel:atom_c:c2350
cpe:/h:intel:atom_c:c2358
cpe:/h:intel:atom_c:c2508
cpe:/h:intel:atom_c:c2516
cpe:/h:intel:atom_c:c2518
cpe:/h:intel:atom_c:c2530
cpe:/h:intel:atom_c:c2538
cpe:/h:intel:atom_c:c2550
cpe:/h:intel:atom_c:c2558
cpe:/h:intel:atom_c:c2718
cpe:/h:intel:atom_c:c2730
cpe:/h:intel:atom_c:c2738
cpe:/h:intel:atom_c:c2750
cpe:/h:intel:atom_c:c2758
cpe:/h:intel:atom_c:c3308
cpe:/h:intel:atom_c:c3338
cpe:/h:intel:atom_c:c3508
cpe:/h:intel:atom_c:c3538
cpe:/h:intel:atom_c:c3558
cpe:/h:intel:atom_c:c3708
cpe:/h:intel:atom_c:c3750
cpe:/h:intel:atom_c:c3758
cpe:/h:intel:atom_c:c3808
cpe:/h:intel:atom_c:c3830
cpe:/h:intel:atom_c:c3850
cpe:/h:intel:atom_c:c3858
cpe:/h:intel:atom_c:c3950
cpe:/h:intel:atom_c:c3955
cpe:/h:intel:atom_c:c3958
Configuration 2
OR
cpe:/h:intel:atom_e:e3805
cpe:/h:intel:atom_e:e3815
cpe:/h:intel:atom_e:e3825
cpe:/h:intel:atom_e:e3826
cpe:/h:intel:atom_e:e3827
cpe:/h:intel:atom_e:e3845
Configuration 3
OR
cpe:/h:intel:atom_x3:c3130
cpe:/h:intel:atom_x3:c3200rk
cpe:/h:intel:atom_x3:c3205rk
cpe:/h:intel:atom_x3:c3230rk
cpe:/h:intel:atom_x3:c3235rk
cpe:/h:intel:atom_x3:c3265rk
cpe:/h:intel:atom_x3:c3295rk
cpe:/h:intel:atom_x3:c3405
cpe:/h:intel:atom_x3:c3445
Configuration 4
OR
cpe:/h:intel:atom_z:z2420
cpe:/h:intel:atom_z:z2460
cpe:/h:intel:atom_z:z2480
cpe:/h:intel:atom_z:z2520
cpe:/h:intel:atom_z:z2560
cpe:/h:intel:atom_z:z2580
cpe:/h:intel:atom_z:z2760
cpe:/h:intel:atom_z:z3460
cpe:/h:intel:atom_z:z3480
cpe:/h:intel:atom_z:z3530
cpe:/h:intel:atom_z:z3560
cpe:/h:intel:atom_z:z3570
cpe:/h:intel:atom_z:z3580
cpe:/h:intel:atom_z:z3590
cpe:/h:intel:atom_z:z3735d
cpe:/h:intel:atom_z:z3735e
cpe:/h:intel:atom_z:z3735f
cpe:/h:intel:atom_z:z3735g
cpe:/h:intel:atom_z:z3736f
cpe:/h:intel:atom_z:z3736g
cpe:/h:intel:atom_z:z3740
cpe:/h:intel:atom_z:z3740d
cpe:/h:intel:atom_z:z3745
cpe:/h:intel:atom_z:z3745d
cpe:/h:intel:atom_z:z3770
cpe:/h:intel:atom_z:z3770d
cpe:/h:intel:atom_z:z3775
cpe:/h:intel:atom_z:z3775d
cpe:/h:intel:atom_z:z3785
cpe:/h:intel:atom_z:z3795
Configuration 5
OR
cpe:/h:intel:celeron_j:j1750
cpe:/h:intel:celeron_j:j1800
cpe:/h:intel:celeron_j:j1850
cpe:/h:intel:celeron_j:j1900
cpe:/h:intel:celeron_j:j3060
cpe:/h:intel:celeron_j:j3160
cpe:/h:intel:celeron_j:j3355
cpe:/h:intel:celeron_j:j3455
cpe:/h:intel:celeron_j:j4005
cpe:/h:intel:celeron_j:j4105
Configuration 6
OR
cpe:/h:intel:celeron_n:n2805
cpe:/h:intel:celeron_n:n2806
cpe:/h:intel:celeron_n:n2807
cpe:/h:intel:celeron_n:n2808
cpe:/h:intel:celeron_n:n2810
cpe:/h:intel:celeron_n:n2815
cpe:/h:intel:celeron_n:n2820
cpe:/h:intel:celeron_n:n2830
cpe:/h:intel:celeron_n:n2840
cpe:/h:intel:celeron_n:n2910
cpe:/h:intel:celeron_n:n2920
cpe:/h:intel:celeron_n:n2930
cpe:/h:intel:celeron_n:n2940
cpe:/h:intel:celeron_n:n3000
Configuration 7
Configuration 8
Configuration 9
Configuration 10
Configuration 11
Configuration 12
Configuration 13
Configuration 14
Configuration 15
Configuration 16
Configuration 17
Configuration 18
Configuration 19
Configuration 20
Configuration 21
Configuration 22
Configuration 23
Configuration 24
Configuration 25
Showing 100 of 1070 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

4 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2018-3693
NVD Published Date:
07/10/2018
NVD Last Modified:
11/30/2018