MEDIUM · 5.6

CVE-2018-12126

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosur...

Vulnerability Description

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

CVSS Score

5.6

MEDIUM

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
IntelMicroarchitectural Store Buffer Data Sampling Firmware-
IntelMicroarchitectural Store Buffer Data Sampling-
FedoraprojectFedora29

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-12126?

CVE-2018-12126 is a vulnerability with a CVSS score of 5.6 (MEDIUM). Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosur...

How severe is CVE-2018-12126?

CVE-2018-12126 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-12126?

Check the references section above for vendor advisories and patch information. Affected products include: Intel Microarchitectural Store Buffer Data Sampling Firmware, Intel Microarchitectural Store Buffer Data Sampling, Fedoraproject Fedora.