2.1
CVSSv2

CVE-2019-0174

Published: 13/06/2019 Updated: 24/08/2020
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Logic condition in specific microprocessors may allow an authenticated user to potentially enable partial physical address information disclosure via local access.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel i9-9900x_firmware -

intel i9-9920x_firmware -

intel i9-9960x_firmware -

intel i9-9980xe_firmware -

intel i9-9940x_firmware -

intel i9-7960x_firmware -

intel i9-7980xe_firmware -

intel i9-7940x_firmware -

intel i9-7920x_firmware -

intel i9-7900x_firmware -

intel i7-7820x_firmware -

intel i7-7800x_firmware -

intel i5-4422e_firmware -

intel i5-4410e_firmware -

intel i5-4402ec_firmware -

intel i5-4402e_firmware -

intel i5-4400e_firmware -

intel i5-4460t_firmware -

intel i5-4460s_firmware -

intel i5-4460_firmware -

intel i5-4440s_firmware -

intel i5-4440_firmware -

intel i5-4430s_firmware -

intel i5-4300m_firmware -

intel i5-4300u_firmware -

intel i5-4300y_firmware -

intel i5-4302y_firmware -

intel i5-4308u_firmware -

intel i5-4310m_firmware -

intel i5-4310u_firmware -

intel i5-4330m_firmware -

intel i5-4340m_firmware -

intel i5-4350u_firmware -

intel i5-4360u_firmware -

intel i5-4200h_firmware -

intel i5-4200m_firmware -

intel i5-4200u_firmware -

intel i5-4200y_firmware -

intel i5-4202y_firmware -

intel i5-4210h_firmware -

intel i5-4210m_firmware -

intel i5-4210u_firmware -

intel i5-4210y_firmware -

intel i5-4220y_firmware -

intel i5-4250u_firmware -

intel i5-4258u_firmware -

intel i5-4260u_firmware -

intel i5-4278u_firmware -

intel i5-4288u_firmware -

intel i3-4330_firmware -

intel i3-4330t_firmware -

intel i3-4330te_firmware -

intel i3-4340_firmware -

intel i3-4340te_firmware -

intel i3-4350_firmware -

intel i3-4350t_firmware -

intel i3-4360_firmware -

intel i3-4360t_firmware -

intel i3-4370_firmware -

intel i3-4370t_firmware -

intel i3-4100e_firmware -

intel i3-4100m_firmware -

intel i3-4100u_firmware -

intel i3-4102e_firmware -

intel i3-4110e_firmware -

intel i3-4110m_firmware -

intel i3-4112e_firmware -

intel i3-4120u_firmware -

intel i3-4158u_firmware -

intel i3-4170t_firmware -

intel i3-4170_firmware -

intel i3-4160t_firmware -

intel i3-4160_firmware -

intel i3-4150t_firmware -

intel i3-4150_firmware -

intel i3-4130t_firmware -

intel i3-4130_firmware -

intel i3-4000m_firmware -

intel i3-4005u_firmware -

intel i3-4010u_firmware -

intel i3-4010y_firmware -

intel i3-4012y_firmware -

intel i3-4020y_firmware -

intel i3-4025u_firmware -

intel i3-4030u_firmware -

intel i3-4030y_firmware -

intel 3550m_firmware -

intel 3556u_firmware -

intel 3558u_firmware -

intel 3560m_firmware -

intel 3560y_firmware -

intel 3561y_firmware -

intel 3805u_firmware -

intel 3825u_firmware -

intel 2981u_firmware -

intel 2980u_firmware -

intel 2970m_firmware -

intel 2961y_firmware -

intel 2957u_firmware -

intel 2955u_firmware -

intel 2950m_firmware -

intel 2002e_firmware -

intel 2000e_firmware -

intel e7-8893_firmware -

intel e7-8891_firmware -

intel e7-8890_firmware -

intel e7-8880l_firmware -

intel e7-8880_firmware -

intel e7-8870_firmware -

intel e7-8867_firmware -

intel e7-8860_firmware -

intel e7-4850_firmware -

intel e7-4830_firmware -

intel e7-4820_firmware -

intel e7-4809_firmware -

intel e5-2699_firmware -

intel e5-4669_firmware -

intel e5-2438l_firmware -

intel e5-1428l_firmware -

intel e5-4667_firmware -

intel e5-2428l_firmware -

intel e5-1620_firmware -

intel e5-4660_firmware -

intel e5-2418l_firmware -

intel e5-1630_firmware -

intel e5-2698_firmware -

intel e5-4655_firmware -

intel e5-2408l_firmware -

intel e5-2697_firmware -

intel e5-1650_firmware -

intel e5-4650_firmware -

intel e5-1660_firmware -

intel e5-4648_firmware -

intel e5-1680_firmware -

intel e5-2695_firmware -

intel e5-4640_firmware -

intel e5-2690_firmware -

intel e5-4627_firmware -

intel e5-2687w_firmware -

intel e5-4620_firmware -

intel e5-4610_firmware -

intel e5-2683_firmware -

intel e5-2680_firmware -

intel e5-2670_firmware -

intel e5-2667_firmware -

intel e5-2660_firmware -

intel e5-2658a_firmware -

intel e5-2658_firmware -

intel e5-2650l_firmware -

intel e5-2650_firmware -

intel e5-2648l_firmware -

intel e5-2643_firmware -

intel e5-2640_firmware -

intel e5-2637_firmware -

intel e5-2630l_firmware -

intel e5-2630_firmware -

intel e5-2628l_firmware -

intel e5-2623_firmware -

intel e5-2620_firmware -

intel e5-2618l_firmware -

intel e5-2609_firmware -

intel e5-2608l_firmware -

intel e5-2603_firmware -

intel e3-1286l_firmware -

intel e3-1286_firmware -

intel e3-1285l_firmware -

intel e3-1285_firmware -

intel e3-1281_firmware -

intel e3-1280_firmware -

intel e3-1276_firmware -

intel e3-1275l_firmware -

intel e3-1270_firmware -

intel e3-1268l_firmware -

intel e3-1271_firmware -

intel e3-1275_firmware -

intel e3-1265l_firmware -

intel e3-1246_firmware -

intel e3-1245_firmware -

intel e3-1241_firmware -

intel e3-1240l_firmware -

intel e3-1240_firmware -

intel e3-1231_firmware -

intel e3-1230l_firmware -

intel e3-1230_firmware -

intel e3-1226_firmware -

intel e3-1225_firmware -

intel e3-1220l_firmware -

intel e3-1220_firmware -

Recent Articles

RAMBleed picks up Rowhammer, smashes DRAM until it leaks apps' crypto-keys, passwords, other secrets
The Register • Thomas Claburn in San Francisco • 11 Jun 2019

Boffins blast boards to boost bits 3 is the magic number (of bits): Flip 'em at once and your ECC protection can be Rowhammer'd

Bit boffins from Australia, Austria, and the US have expanded upon the Rowhammer memory attack technique to create more dangerous variation called RAMBleed that can expose confidential system memory. The memory integrity issue tied to Rowhammer was known to Intel since at least 2012 and began to be explored in academic research in 2014. The following year, Google Project Zero researchers developed an exploit technique to gain kernel privileges by repeatedly writing to memory locations into order...