First published: Tue Aug 14 2018(Updated: )
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Core i3 | =6006u | |
Intel Core i3 | =6098p | |
Intel Core i3 | =6100 | |
Intel Core i3 | =6100e | |
Intel Core i3 | =6100h | |
Intel Core i3 | =6100t | |
Intel Core i3 | =6100te | |
Intel Core i3 | =6100u | |
Intel Core i3 | =6102e | |
Intel Core i3 | =6157u | |
Intel Core i3 | =6167u | |
Intel Core i3 | =6300 | |
Intel Core i3 | =6300t | |
Intel Core i3 | =6320 | |
Intel Core i5 | =650 | |
Intel Core i5 | =655k | |
Intel Core i5 | =660 | |
Intel Core i5 | =661 | |
Intel Core i5 | =670 | |
Intel Core i5 | =680 | |
Intel Core i5 | =6200u | |
Intel Core i5 | =6260u | |
Intel Core i5 | =6267u | |
Intel Core i5 | =6287u | |
Intel Core i5 | =6300hq | |
Intel Core i5 | =6300u | |
Intel Core i5 | =6350hq | |
Intel Core i5 | =6360u | |
Intel Core i5 | =6400 | |
Intel Core i5 | =6400t | |
Intel Core i5 | =6402p | |
Intel Core i5 | =6440eq | |
Intel Core i5 | =6440hq | |
Intel Core i5 | =6442eq | |
Intel Core i5 | =6500 | |
Intel Core i5 | =6500t | |
Intel Core i5 | =6500te | |
Intel Core i5 | =6585r | |
Intel Core i5 | =6600 | |
Intel Core i5 | =6600k | |
Intel Core i5 | =6600t | |
Intel Core i5 | =6685r | |
Intel CPU Cores | =610e | |
Intel CPU Cores | =620le | |
Intel CPU Cores | =620lm | |
Intel CPU Cores | =620m | |
Intel CPU Cores | =620ue | |
Intel CPU Cores | =620um | |
Intel CPU Cores | =640lm | |
Intel CPU Cores | =640m | |
Intel CPU Cores | =640um | |
Intel CPU Cores | =660lm | |
Intel CPU Cores | =660ue | |
Intel CPU Cores | =660um | |
Intel CPU Cores | =680um | |
Intel Core i5 | =750 | |
Intel Core i5 | =750s | |
Intel Core i5 | =760 | |
Intel CPU Cores | =7y75 | |
Intel CPU Cores | =720qm | |
Intel CPU Cores | =740qm | |
Intel CPU Cores | =7500u | |
Intel CPU Cores | =7560u | |
Intel CPU Cores | =7567u | |
Intel CPU Cores | =7600u | |
Intel CPU Cores | =7660u | |
Intel CPU Cores | =7700 | |
Intel CPU Cores | =7700hq | |
Intel CPU Cores | =7700k | |
Intel CPU Cores | =7700t | |
Intel CPU Cores | =7820eq | |
Intel CPU Cores | =7820hk | |
Intel CPU Cores | =7820hq | |
Intel CPU Cores | =7920hq | |
Intel Core i3 | =8100 | |
Intel Core i3 | =8350k | |
Intel Core i5 | =8250u | |
Intel Core i5 | =8350u | |
Intel Core i5 | =8400 | |
Intel Core i5 | =8600k | |
Intel CPU Cores | =820qm | |
Intel CPU Cores | =840qm | |
Intel CPU Cores | =860 | |
Intel CPU Cores | =860s | |
Intel CPU Cores | =870 | |
Intel CPU Cores | =870s | |
Intel CPU Cores | =875k | |
Intel CPU Cores | =880 | |
Intel CPU Cores | =8550u | |
Intel CPU Cores | =8650u | |
Intel CPU Cores | =8700 | |
Intel CPU Cores | =8700k | |
Intel Xeon E3 | =1515m_v5 | |
Intel Xeon E3 | =1535m_v5 | |
Intel Xeon E3 | =1545m_v5 | |
Intel Xeon E3 | =1558l_v5 | |
Intel Xeon E3 | =1565l_v5 | |
Intel Xeon E3 | =1575m_v5 | |
Intel Xeon E3 | =1578l_v5 | |
Intel Xeon E3 | =1585_v5 | |
Intel Xeon E3 | =1585l_v5 | |
Intel Xeon E3-1220 V5 | ||
Intel Xeon E3-1225 V5 | ||
Intel Xeon E3-1230 V5 | ||
Intel Xeon E3-1235L V5 | ||
Intel Xeon E3-1240 V5 | ||
Intel Xeon E3-1240 V5 | ||
Intel Xeon E3-1245 v5 | ||
Intel Xeon E3-1260L v5 | ||
Intel Xeon E3-1268L v5 | ||
Intel Xeon E3-1270 v5 | ||
Intel Xeon E3-1275 v5 | ||
Intel Xeon E3-1280 V5 | ||
Intel Xeon E3-1505L v5 | ||
Intel Xeon E3-1505m V5 | ||
Intel Xeon E3 | =1505m_v6 | |
Intel Xeon E3 | =1535m_v6 | |
Intel Xeon E3-1220 v6 | ||
Intel Xeon E3-1225 V6 | ||
Intel Xeon E3-1230 V6 | ||
Intel Xeon E3-1240 v6 | ||
Intel Xeon E3-1245 | ||
Intel Xeon E3-1270 V6 | ||
Intel Xeon E3-1275 V6 | ||
Intel Xeon E3-1280 V6 | ||
Intel Xeon E3-1285 V6 | ||
Intel Xeon E3-1501L v6 | ||
Intel Xeon E3-1501M V6 | ||
Intel Xeon E3-1505L V6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3615 has been assigned a high severity rating due to the potential for unauthorized information disclosure.
To mitigate CVE-2018-3615, ensure that your system is updated with the latest microcode patches from Intel.
CVE-2018-3615 affects various Intel Core and Xeon processors that utilize speculative execution and Intel SGX.
The impact of CVE-2018-3615 includes the possible unauthorized disclosure of sensitive data from the L1 data cache.
CVE-2018-3615 requires local user access for exploitation, meaning it cannot be exploited remotely.