Vulnerability Details : CVE-2020-13844
Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
Products affected by CVE-2020-13844
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
- cpe:2.3:o:arm:cortex-a32_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:arm:cortex-a35_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:arm:cortex-a53_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:arm:cortex-a34_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-13844
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-13844
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2020-13844
-
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-13844
-
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
[security-announce] openSUSE-SU-2020:1692-1: moderate: Security update fMailing List;Third Party Advisory
-
http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
[llvm-dev] Mitigating straight-line speculation vulnerability CVE-2020-13844Mailing List;Third Party Advisory
-
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
Straight Line Speculation (SLS) mitigation.Patch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
[security-announce] openSUSE-SU-2020:1693-1: moderate: Security update fMailing List;Third Party Advisory
-
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
Speculative Processor Vulnerability | Frequently asked questions – Arm DeveloperVendor Advisory
-
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Speculative Processor Vulnerability – Arm DeveloperVendor Advisory
-
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
Vendor Advisory
Jump to