6.4

CVE-2018-3615

Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.

Data is provided by the National Vulnerability Database (NVD)
IntelCore I3 Version6006u
IntelCore I3 Version6098p
IntelCore I3 Version6100
IntelCore I3 Version6100e
IntelCore I3 Version6100h
IntelCore I3 Version6100t
IntelCore I3 Version6100te
IntelCore I3 Version6100u
IntelCore I3 Version6102e
IntelCore I3 Version6157u
IntelCore I3 Version6167u
IntelCore I3 Version6300
IntelCore I3 Version6300t
IntelCore I3 Version6320
IntelCore I5 Version650
IntelCore I5 Version655k
IntelCore I5 Version660
IntelCore I5 Version661
IntelCore I5 Version670
IntelCore I5 Version680
IntelCore I5 Version6200u
IntelCore I5 Version6260u
IntelCore I5 Version6267u
IntelCore I5 Version6287u
IntelCore I5 Version6300hq
IntelCore I5 Version6300u
IntelCore I5 Version6350hq
IntelCore I5 Version6360u
IntelCore I5 Version6400
IntelCore I5 Version6400t
IntelCore I5 Version6402p
IntelCore I5 Version6440eq
IntelCore I5 Version6440hq
IntelCore I5 Version6442eq
IntelCore I5 Version6500
IntelCore I5 Version6500t
IntelCore I5 Version6500te
IntelCore I5 Version6585r
IntelCore I5 Version6600
IntelCore I5 Version6600k
IntelCore I5 Version6600t
IntelCore I5 Version6685r
IntelCore I7 Version610e
IntelCore I7 Version620le
IntelCore I7 Version620lm
IntelCore I7 Version620m
IntelCore I7 Version620ue
IntelCore I7 Version620um
IntelCore I7 Version640lm
IntelCore I7 Version640m
IntelCore I7 Version640um
IntelCore I7 Version660lm
IntelCore I7 Version660ue
IntelCore I7 Version660um
IntelCore I7 Version680um
IntelCore I5 Version750
IntelCore I5 Version750s
IntelCore I5 Version760
IntelCore I7 Version7y75
IntelCore I7 Version720qm
IntelCore I7 Version740qm
IntelCore I7 Version7500u
IntelCore I7 Version7560u
IntelCore I7 Version7567u
IntelCore I7 Version7600u
IntelCore I7 Version7660u
IntelCore I7 Version7700
IntelCore I7 Version7700hq
IntelCore I7 Version7700k
IntelCore I7 Version7700t
IntelCore I7 Version7820eq
IntelCore I7 Version7820hk
IntelCore I7 Version7820hq
IntelCore I7 Version7920hq
IntelCore I3 Version8100
IntelCore I3 Version8350k
IntelCore I5 Version8250u
IntelCore I5 Version8350u
IntelCore I5 Version8400
IntelCore I5 Version8600k
IntelCore I7 Version820qm
IntelCore I7 Version840qm
IntelCore I7 Version860
IntelCore I7 Version860s
IntelCore I7 Version870
IntelCore I7 Version870s
IntelCore I7 Version875k
IntelCore I7 Version880
IntelCore I7 Version8550u
IntelCore I7 Version8650u
IntelCore I7 Version8700
IntelCore I7 Version8700k
IntelXeon E3 Version1515m_v5
IntelXeon E3 Version1535m_v5
IntelXeon E3 Version1545m_v5
IntelXeon E3 Version1558l_v5
IntelXeon E3 Version1565l_v5
IntelXeon E3 Version1575m_v5
IntelXeon E3 Version1578l_v5
IntelXeon E3 Version1585_v5
IntelXeon E3 Version1585l_v5
IntelXeon E3 1220 V5 Version-
IntelXeon E3 1225 V5 Version-
IntelXeon E3 1230 V5 Version-
IntelXeon E3 1235l V5 Version-
IntelXeon E3 1240 V5 Version-
IntelXeon E3 1240l V5 Version-
IntelXeon E3 1245 V5 Version-
IntelXeon E3 1260l V5 Version-
IntelXeon E3 1268l V5 Version-
IntelXeon E3 1270 V5 Version-
IntelXeon E3 1275 V5 Version-
IntelXeon E3 1280 V5 Version-
IntelXeon E3 1505l V5 Version-
IntelXeon E3 1505m V5 Version-
IntelXeon E3 Version1505m_v6
IntelXeon E3 Version1535m_v6
IntelXeon E3 1220 V6 Version-
IntelXeon E3 1225 V6 Version-
IntelXeon E3 1230 V6 Version-
IntelXeon E3 1240 V6 Version-
IntelXeon E3 1245 V6 Version-
IntelXeon E3 1270 V6 Version-
IntelXeon E3 1275 V6 Version-
IntelXeon E3 1280 V6 Version-
IntelXeon E3 1285 V6 Version-
IntelXeon E3 1501l V6 Version-
IntelXeon E3 1501m V6 Version-
IntelXeon E3 1505l V6 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.18% 0.778
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.4 1.1 4.7
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
nvd@nist.gov 5.4 3.4 7.8
AV:L/AC:M/Au:N/C:C/I:P/A:N
CWE-203 Observable Discrepancy

The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.

http://www.securityfocus.com/bid/105080
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1041451
Third Party Advisory
VDB Entry
https://foreshadowattack.eu/
Third Party Advisory
Technical Description