Vulnerability Details : CVE-2019-11091
Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Vulnerability category: Information leak
Products affected by CVE-2019-11091
- cpe:2.3:o:intel:microarchitectural_data_sampling_uncacheable_memory_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-11091
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-11091
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.7
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:N/A:N |
3.4
|
6.9
|
NIST | |
5.6
|
MEDIUM | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N |
1.1
|
4.0
|
NIST |
References for CVE-2019-11091
-
https://access.redhat.com/errata/RHSA-2019:2553
RHSA-2019:2553 - Security Advisory - Red Hat Customer Portal
-
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
-
https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc
-
https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html
[SECURITY] [DLA 1789-2] intel-microcode security update
-
https://www.synology.com/security/advisory/Synology_SA_19_24
Synology Inc.
-
https://www.debian.org/security/2020/dsa-4602
Debian -- Security Information -- DSA-4602-1 xen
-
https://seclists.org/bugtraq/2020/Jan/21
Bugtraq: [SECURITY] [DSA 4602-1] xen security update
-
https://usn.ubuntu.com/3977-3/
USN-3977-3: Intel Microcode update | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html
[security-announce] openSUSE-SU-2019:1806-1: important: Security update
-
https://security.gentoo.org/glsa/202003-56
Xen: Multiple vulnerabilities (GLSA 202003-56) — Gentoo security
-
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html
[security-announce] openSUSE-SU-2019:1805-1: important: Security update
-
https://seclists.org/bugtraq/2019/Jun/28
Bugtraq: [SECURITY] [DSA 4447-2] intel-microcode security update
-
https://seclists.org/bugtraq/2019/Nov/15
Bugtraq: [SECURITY] [DSA 4564-1] linux security update
-
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en
Security Advisory - Intel Microarchitectural Data Sampling (MDS) vulnerabilities
-
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html
[security-announce] openSUSE-SU-2019:1505-1: important: Security update
-
https://seclists.org/bugtraq/2019/Jun/36
Bugtraq: [SECURITY] [DSA 4469-1] libvirt security update
-
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10292
McAfee Security Bulletin - Updates for Intel® "ZombieLoad" microprocessor data leakage flaws (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091)
-
https://access.redhat.com/errata/RHSA-2019:1455
RHSA-2019:1455 - Security Advisory - Red Hat Customer Portal
-
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
INTEL-SA-00233Vendor Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/
[SECURITY] Fedora 29 Update: xen-4.11.1-5.fc29 - package-announce - Fedora Mailing-ListsThird Party Advisory
Jump to