CVE-2018-12127
hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
En Microarchitectural Load Port Data Sampling (MLPDS): los puertos de carga en algunos microprocesadores que usan ejecución especulativa pueden permitir que un usuario autenticado active potencialmente la divulgación de información por medio de un canal lateral con acceso local. Puede encontrar una lista de los productos impactados aquí: https://www.intel.com/content/dam/www/public/us/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Microprocessors use a ‘load port’ subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPU’s pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-06-11 CVE Reserved
- 2019-05-15 CVE Published
- 2024-05-23 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-385: Covert Timing Channel
CAPEC
References (28)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html | X_refsource_misc | |
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt | X_refsource_confirm | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en | X_refsource_confirm | |
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf | X_refsource_confirm | |
https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf | X_refsource_confirm | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10292 | X_refsource_confirm | |
https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html | Mailing List | |
https://seclists.org/bugtraq/2019/Jun/28 | Mailing List | |
https://seclists.org/bugtraq/2019/Jun/36 | Mailing List | |
https://seclists.org/bugtraq/2019/Nov/15 | Mailing List | |
https://seclists.org/bugtraq/2019/Nov/16 | Mailing List | |
https://seclists.org/bugtraq/2020/Jan/21 | Mailing List | |
https://www.synology.com/security/advisory/Synology_SA_19_24 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Intel Search vendor "Intel" | Microarchitectural Load Port Data Sampling Firmware Search vendor "Intel" for product "Microarchitectural Load Port Data Sampling Firmware" | - | - |
Affected
| in | Intel Search vendor "Intel" | Microarchitectural Load Port Data Sampling Search vendor "Intel" for product "Microarchitectural Load Port Data Sampling" | - | - |
Safe
|
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 29 Search vendor "Fedoraproject" for product "Fedora" and version "29" | - |
Affected
|