486
VMScore

CVE-2018-3615

Published: 14/08/2018 Updated: 24/08/2020
CVSS v2 Base Score: 5.4 | Impact Score: 7.8 | Exploitability Score: 3.4
CVSS v3 Base Score: 6.4 | Impact Score: 4.7 | Exploitability Score: 1.1
VMScore: 486
Vector: AV:L/AC:M/Au:N/C:C/I:P/A:N

Vulnerability Summary

Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel core i3 6006u

intel core i3 6098p

intel core i3 6102e

intel core i3 6157u

intel core i5 661

intel core i5 670

intel core i5 6300u

intel core i5 6350hq

intel core i5 6442eq

intel core i5 6500

intel core i5 6500t

intel core i7 610e

intel core i7 620le

intel core i7 640um

intel core i7 660lm

intel core i3 6100h

intel core i3 6100t

intel core i3 6320

intel core i5 650

intel core i3 6100te

intel core i3 6100u

intel core i5 655k

intel core i5 660

intel core i5 6287u

intel core i5 6300hq

intel core i5 6440eq

intel core i5 6440hq

intel core i5 6600t

intel core i5 6685r

intel core i7 640lm

intel core i7 640m

intel core i5 6260u

intel core i5 6267u

intel core i5 6400t

intel core i5 6402p

intel core i5 6600

intel core i5 6600k

intel core i7 620ue

intel core i7 620um

intel core i7 680um

intel core i3 6100

intel core i3 6100e

intel core i3 6167u

intel core i3 6300

intel core i3 6300t

intel core i5 680

intel core i5 6200u

intel core i5 6360u

intel core i5 6400

intel core i5 6500te

intel core i5 6585r

intel core i7 620lm

intel core i7 620m

intel core i7 660ue

intel core i7 660um

intel core i7 7y75

intel core i7 720qm

intel core i7 7700

intel core i7 7700hq

intel core i5 750

intel core i5 750s

intel core i5 760

intel core i7 7600u

intel core i7 7660u

intel core i7 7820hq

intel core i7 7920hq

intel core i7 7560u

intel core i7 7567u

intel core i7 7820eq

intel core i7 7820hk

intel core i7 740qm

intel core i7 7500u

intel core i7 7700k

intel core i7 7700t

intel core i3 8100

intel core i7 860

intel core i7 860s

intel core i7 8700

intel core i7 8700k

intel core i7 820qm

intel core i7 840qm

intel core i7 8550u

intel core i7 8650u

intel core i5 8350u

intel core i5 8400

intel core i5 8600k

intel core i7 875k

intel core i7 880

intel core i3 8350k

intel core i5 8250u

intel core i7 870

intel core i7 870s

intel xeon e3 1240l v5 -

intel xeon e3 1245 v5 -

intel xeon e3 1515m_v5

intel xeon e3 1535m_v5

intel xeon e3 1585l_v5

intel xeon e3 1235l v5 -

intel xeon e3 1240 v5 -

intel xeon e3 1505l v5 -

intel xeon e3 1505m v5 -

intel xeon e3 1578l_v5

intel xeon e3 1585_v5

intel xeon e3 1225 v5 -

intel xeon e3 1230 v5 -

intel xeon e3 1270 v5 -

intel xeon e3 1275 v5 -

intel xeon e3 1280 v5 -

intel xeon e3 1565l_v5

intel xeon e3 1575m_v5

intel xeon e3 1220 v5 -

intel xeon e3 1260l v5 -

intel xeon e3 1268l v5 -

intel xeon e3 1545m_v5

intel xeon e3 1558l_v5

intel xeon e3 1275 v6 -

intel xeon e3 1280 v6 -

intel xeon e3 1245 v6 -

intel xeon e3 1270 v6 -

intel xeon e3 1535m_v6

intel xeon e3 1230 v6 -

intel xeon e3 1240 v6 -

intel xeon e3 1505l v6 -

intel xeon e3 1505m_v6

intel xeon e3 1220 v6 -

intel xeon e3 1225 v6 -

intel xeon e3 1285 v6 -

intel xeon e3 1501l v6 -

intel xeon e3 1501m v6 -

Vendor Advisories

Fixes for L1Terminal Fault security issues: L1 Terminal Fault-OS/ SMM:Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and side-channel analysis(CVE-2018-3620) L1 Termin ...
Fixes for L1Terminal Fault security issues: L1 Terminal Fault-OS/ SMM:Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and side-channel analysis(CVE-2018-3620) L1 Termin ...
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis ...
5On August 14th, 2018, three vulnerabilities were disclosed by Intel and security researchers that leverage a speculative execution side-channel method referred to as L1 Terminal Fault (L1TF) that affects modern Intel microprocessors These vulnerabilities could allow an unprivileged, local attacker, in specific circumstances, to read privileged me ...
A new speculative execution side channel variant has been discovered called L1 Terminal Fault (L1TF) There are no reports that L1TF has been used in real world exploits This currently affects select Intel processors Mitigations will require microcode updates released earlier this year, plus operating system and hypervisor software updates ...
A new speculative execution side channel variant has been discovered called L1 Terminal Fault (L1TF) There are no reports that L1TF has been used in real world exploits This currently affects select Intel processors Mitigations will require microcode updates released earlier this year, plus operating system and hypervisor software updates ...
Intel and security researchers publicly disclosed three new cpu side-channel vulnerabilities (CVE-2018-3615, CVE-2018-3620 and CVE-2018-3646) Successful exploit of these vulnerabilities could allow a local attacker to read the memory of other processes in specific situations These vulnerabilities are named by researchers as "Foreshadow" and ...
PAN-SA-2018-0011 Information about L1 Terminal Fault findings ...

Recent Articles

Foreshadow and Intel SGX software attestation: 'The whole trust model collapses'
The Register • Richard Chirgwin • 15 Aug 2018

El Reg talks to Dr Yuval Yarom about Intel's memory leaking catastrophe Three more data-leaking security holes found in Intel chips as designers swap security for speed

Interview In the wake of yet another collection of Intel bugs, The Register had the chance to speak to Foreshadow co-discoverer and University of Adelaide and Data61 researcher Dr Yuval Yarom about its impact. Dr Yarom explained that one of the big impacts of Foreshadow is that it destroys an important trust model – SGX attestations, which guarantee that the code you publish is the code someone else is running. Think of it as tamper-evident packaging for software: having published your softwar...

Three more data-leaking security holes found in Intel chips as designers swap security for speed
The Register • Chris Williams, Editor in Chief • 14 Aug 2018

Apps, kernels, virtual machines, SGX, SMM at risk from attack Another data-leaking Spectre CPU flaw among Intel's dirty dozen of security bug alerts today

Intel will today disclose three more vulnerabilities in its processors that can be exploited by malware and malicious virtual machines to potentially steal secret information from computer memory. These secrets can include passwords, personal and financial records, and encryption keys. They can be potentially lifted from other applications and other customers' virtual machines, as well as SGX enclaves, and System Management Mode (SMM) memory. SGX is Intel's technology that is supposed to protect...