CVE-2018-3639
MEDIUM EXPLOITED IN THE WILD RANSOMWAREIntel Atom C < 3.1 - Information Disclosure
Title source: ruleDescription
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · cdoshardware
https://www.exploit-db.com/exploits/44695
nomisec
WORKING POC
1 stars
by Shuiliusheng · remote
https://github.com/Shuiliusheng/CVE-2018-3639-specter-v4-
nomisec
WORKING POC
by malindarathnayake · poc
https://github.com/malindarathnayake/Intel-CVE-2018-3639-Mitigation_RegistryUpdate
References (147)
... and 127 more
Scores
CVSS v3
5.5
EPSS
0.4602
EPSS Percentile
97.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2020-02-25
InTheWild.io
2022-05-25
Ransomware Use
Confirmed
CWE
CWE-203
Status
published
Products (50)
arm/cortex-a
15
arm/cortex-a
57
arm/cortex-a
72
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
17.10
canonical/ubuntu_linux
18.04
debian/debian_linux
8.0
debian/debian_linux
9.0
... and 40 more
Published
May 22, 2018
Tracked Since
Feb 18, 2026