CVE-2018-3639

MEDIUM EXPLOITED IN THE WILD RANSOMWARE

Intel Atom C < 3.1 - Information Disclosure

Title source: rule

Description

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

Exploits (6)

exploitdb WORKING POC VERIFIED
by Google Security Research · cdoshardware
https://www.exploit-db.com/exploits/44695
nomisec WORKING POC 15 stars
by mmxsrup · local
https://github.com/mmxsrup/CVE-2018-3639
nomisec WORKING POC 9 stars
by tyhicks · poc
https://github.com/tyhicks/ssbd-tools
nomisec WORKING POC 1 stars
by Shuiliusheng · remote
https://github.com/Shuiliusheng/CVE-2018-3639-specter-v4-
nomisec WORKING POC
by malindarathnayake · poc
https://github.com/malindarathnayake/Intel-CVE-2018-3639-Mitigation_RegistryUpdate
vulncheck_xdb WORKING POC
local
https://github.com/Mehliug-git/PENTEST-RESEARCH

References (147)

... and 127 more

Scores

CVSS v3 5.5
EPSS 0.4602
EPSS Percentile 97.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2020-02-25
InTheWild.io 2022-05-25
Ransomware Use Confirmed
CWE
CWE-203
Status published
Products (50)
arm/cortex-a 15
arm/cortex-a 57
arm/cortex-a 72
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 17.10
canonical/ubuntu_linux 18.04
debian/debian_linux 8.0
debian/debian_linux 9.0
... and 40 more
Published May 22, 2018
Tracked Since Feb 18, 2026