Vulnerabilites related to Intel Corporation - Microprocessors with Speculative Execution
cve-2017-5715
Vulnerability from cvelistv5
Published
2018-01-04 13:00
Modified
2024-09-17 03:28
Severity ?
Summary
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
References
http://nvidia.custhelp.com/app/answers/detail/a_id/4609x_refsource_CONFIRM
https://usn.ubuntu.com/3560-1/vendor-advisory, x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.htmlmailing-list, x_refsource_MLIST
https://www.debian.org/security/2018/dsa-4187vendor-advisory, x_refsource_DEBIAN
https://usn.ubuntu.com/3542-2/vendor-advisory, x_refsource_UBUNTU
https://security.gentoo.org/glsa/201810-06vendor-advisory, x_refsource_GENTOO
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlx_refsource_CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlx_refsource_CONFIRM
https://usn.ubuntu.com/3540-2/vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/security/vulnerabilities/speculativeexecutionx_refsource_CONFIRM
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlmailing-list, x_refsource_MLIST
https://usn.ubuntu.com/3597-1/vendor-advisory, x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.htmlmailing-list, x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlvendor-advisory, x_refsource_SUSE
http://nvidia.custhelp.com/app/answers/detail/a_id/4611x_refsource_CONFIRM
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.htmlx_refsource_MISC
https://www.debian.org/security/2018/dsa-4213vendor-advisory, x_refsource_DEBIAN
https://cert.vde.com/en-us/advisories/vde-2018-002x_refsource_CONFIRM
https://www.debian.org/security/2018/dsa-4120vendor-advisory, x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.htmlvendor-advisory, x_refsource_SUSE
https://usn.ubuntu.com/3580-1/vendor-advisory, x_refsource_UBUNTU
https://support.f5.com/csp/article/K91229003x_refsource_CONFIRM
https://usn.ubuntu.com/3531-3/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/3620-2/vendor-advisory, x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.htmlvendor-advisory, x_refsource_SUSE
https://usn.ubuntu.com/3582-1/vendor-advisory, x_refsource_UBUNTU
https://www.debian.org/security/2018/dsa-4188vendor-advisory, x_refsource_DEBIAN
https://access.redhat.com/errata/RHSA-2018:0292vendor-advisory, x_refsource_REDHAT
http://xenbits.xen.org/xsa/advisory-254.htmlx_refsource_CONFIRM
https://security.netapp.com/advisory/ntap-20180104-0001/x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.htmlvendor-advisory, x_refsource_SUSE
https://www.synology.com/support/security/Synology_SA_18_01x_refsource_CONFIRM
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.htmlx_refsource_MISC
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txtx_refsource_CONFIRM
http://www.securityfocus.com/bid/102376vdb-entry, x_refsource_BID
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilityx_refsource_CONFIRM
https://usn.ubuntu.com/3594-1/vendor-advisory, x_refsource_UBUNTU
http://www.kb.cert.org/vuls/id/584653third-party-advisory, x_refsource_CERT-VN
https://www.kb.cert.org/vuls/id/180049third-party-advisory, x_refsource_CERT-VN
https://cert.vde.com/en-us/advisories/vde-2018-003x_refsource_CONFIRM
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixesx_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.htmlvendor-advisory, x_refsource_SUSE
https://usn.ubuntu.com/3690-1/vendor-advisory, x_refsource_UBUNTU
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_usx_refsource_CONFIRM
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001x_refsource_CONFIRM
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_usx_refsource_CONFIRM
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.htmlx_refsource_CONFIRM
https://usn.ubuntu.com/3549-1/vendor-advisory, x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.htmlvendor-advisory, x_refsource_SUSE
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/x_refsource_CONFIRM
https://support.citrix.com/article/CTX231399x_refsource_CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlx_refsource_CONFIRM
https://spectreattack.com/x_refsource_MISC
https://usn.ubuntu.com/3531-1/vendor-advisory, x_refsource_UBUNTU
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.ascvendor-advisory, x_refsource_FREEBSD
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.htmlvendor-advisory, x_refsource_SUSE
https://usn.ubuntu.com/3581-1/vendor-advisory, x_refsource_UBUNTU
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/x_refsource_CONFIRM
http://www.securitytracker.com/id/1040071vdb-entry, x_refsource_SECTRACK
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlmailing-list, x_refsource_MLIST
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-frx_refsource_CONFIRM
https://usn.ubuntu.com/3597-2/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/3581-2/vendor-advisory, x_refsource_UBUNTU
http://nvidia.custhelp.com/app/answers/detail/a_id/4614x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.htmlvendor-advisory, x_refsource_SUSE
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.htmlmailing-list, x_refsource_MLIST
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannelvendor-advisory, x_refsource_CISCO
https://usn.ubuntu.com/usn/usn-3516-1/vendor-advisory, x_refsource_UBUNTU
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.htmlx_refsource_CONFIRM
https://www.exploit-db.com/exploits/43427/exploit, x_refsource_EXPLOIT-DB
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.htmlvendor-advisory, x_refsource_SUSE
https://usn.ubuntu.com/3541-2/vendor-advisory, x_refsource_UBUNTU
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.htmlx_refsource_MISC
https://support.lenovo.com/us/en/solutions/LEN-18282x_refsource_CONFIRM
https://usn.ubuntu.com/3777-3/vendor-advisory, x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.htmlvendor-advisory, x_refsource_SUSE
https://www.vmware.com/security/advisories/VMSA-2018-0007.htmlx_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.htmlvendor-advisory, x_refsource_SUSE
http://nvidia.custhelp.com/app/answers/detail/a_id/4613x_refsource_CONFIRM
https://usn.ubuntu.com/3561-1/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/3582-2/vendor-advisory, x_refsource_UBUNTU
https://seclists.org/bugtraq/2019/Jun/36mailing-list, x_refsource_BUGTRAQ
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txtx_refsource_CONFIRM
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlx_refsource_MISC
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfx_refsource_CONFIRM
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.ascvendor-advisory, x_refsource_FREEBSD
https://seclists.org/bugtraq/2019/Nov/16mailing-list, x_refsource_BUGTRAQ
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.htmlx_refsource_MISC
https://security.paloaltonetworks.com/CVE-2017-5715x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.htmlmailing-list, x_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.htmlmailing-list, x_refsource_MLIST
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:11:48.456Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
               },
               {
                  name: "USN-3560-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3560-1/",
               },
               {
                  name: "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html",
               },
               {
                  name: "DSA-4187",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2018/dsa-4187",
               },
               {
                  name: "USN-3542-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3542-2/",
               },
               {
                  name: "GLSA-201810-06",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201810-06",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
               },
               {
                  name: "USN-3540-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3540-2/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
               },
               {
                  name: "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html",
               },
               {
                  name: "USN-3597-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3597-1/",
               },
               {
                  name: "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html",
               },
               {
                  name: "SUSE-SU-2018:0012",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html",
               },
               {
                  name: "SUSE-SU-2018:0011",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
               },
               {
                  name: "DSA-4213",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2018/dsa-4213",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert.vde.com/en-us/advisories/vde-2018-002",
               },
               {
                  name: "DSA-4120",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2018/dsa-4120",
               },
               {
                  name: "openSUSE-SU-2018:0013",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html",
               },
               {
                  name: "USN-3580-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3580-1/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.f5.com/csp/article/K91229003",
               },
               {
                  name: "USN-3531-3",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3531-3/",
               },
               {
                  name: "USN-3620-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3620-2/",
               },
               {
                  name: "openSUSE-SU-2018:0022",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html",
               },
               {
                  name: "USN-3582-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3582-1/",
               },
               {
                  name: "DSA-4188",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2018/dsa-4188",
               },
               {
                  name: "RHSA-2018:0292",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0292",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://xenbits.xen.org/xsa/advisory-254.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20180104-0001/",
               },
               {
                  name: "SUSE-SU-2018:0019",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.synology.com/support/security/Synology_SA_18_01",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
               },
               {
                  name: "102376",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/102376",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
               },
               {
                  name: "USN-3594-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3594-1/",
               },
               {
                  name: "VU#584653",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/584653",
               },
               {
                  name: "VU#180049",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/180049",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert.vde.com/en-us/advisories/vde-2018-003",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
               },
               {
                  name: "SUSE-SU-2018:0009",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html",
               },
               {
                  name: "USN-3690-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3690-1/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
               },
               {
                  name: "USN-3549-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3549-1/",
               },
               {
                  name: "SUSE-SU-2018:0007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.citrix.com/article/CTX231399",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://spectreattack.com/",
               },
               {
                  name: "USN-3531-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3531-1/",
               },
               {
                  name: "FreeBSD-SA-18:03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
               },
               {
                  name: "SUSE-SU-2018:0006",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html",
               },
               {
                  name: "USN-3581-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3581-1/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
               },
               {
                  name: "1040071",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1040071",
               },
               {
                  name: "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
               },
               {
                  name: "USN-3597-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3597-2/",
               },
               {
                  name: "USN-3581-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3581-2/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
               },
               {
                  name: "SUSE-SU-2018:0010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html",
               },
               {
                  name: "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html",
               },
               {
                  name: "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel",
               },
               {
                  name: "USN-3516-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/usn/usn-3516-1/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
               },
               {
                  name: "43427",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "https://www.exploit-db.com/exploits/43427/",
               },
               {
                  name: "SUSE-SU-2018:0020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html",
               },
               {
                  name: "USN-3541-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3541-2/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/us/en/solutions/LEN-18282",
               },
               {
                  name: "USN-3777-3",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3777-3/",
               },
               {
                  name: "openSUSE-SU-2018:0023",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
               },
               {
                  name: "SUSE-SU-2018:0008",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
               },
               {
                  name: "USN-3561-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3561-1/",
               },
               {
                  name: "USN-3582-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3582-2/",
               },
               {
                  name: "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Jun/36",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
               },
               {
                  name: "FreeBSD-SA-19:26",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc",
               },
               {
                  name: "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Nov/16",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.paloaltonetworks.com/CVE-2017-5715",
               },
               {
                  name: "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html",
               },
               {
                  name: "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Microprocessors with Speculative Execution",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "All",
                  },
               ],
            },
         ],
         datePublic: "2018-01-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-16T08:06:27",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
            },
            {
               name: "USN-3560-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3560-1/",
            },
            {
               name: "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html",
            },
            {
               name: "DSA-4187",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2018/dsa-4187",
            },
            {
               name: "USN-3542-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3542-2/",
            },
            {
               name: "GLSA-201810-06",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201810-06",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
            },
            {
               name: "USN-3540-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3540-2/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
            },
            {
               name: "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html",
            },
            {
               name: "USN-3597-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3597-1/",
            },
            {
               name: "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html",
            },
            {
               name: "SUSE-SU-2018:0012",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html",
            },
            {
               name: "SUSE-SU-2018:0011",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
            },
            {
               name: "DSA-4213",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2018/dsa-4213",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert.vde.com/en-us/advisories/vde-2018-002",
            },
            {
               name: "DSA-4120",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2018/dsa-4120",
            },
            {
               name: "openSUSE-SU-2018:0013",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html",
            },
            {
               name: "USN-3580-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3580-1/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.f5.com/csp/article/K91229003",
            },
            {
               name: "USN-3531-3",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3531-3/",
            },
            {
               name: "USN-3620-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3620-2/",
            },
            {
               name: "openSUSE-SU-2018:0022",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html",
            },
            {
               name: "USN-3582-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3582-1/",
            },
            {
               name: "DSA-4188",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2018/dsa-4188",
            },
            {
               name: "RHSA-2018:0292",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:0292",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://xenbits.xen.org/xsa/advisory-254.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20180104-0001/",
            },
            {
               name: "SUSE-SU-2018:0019",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.synology.com/support/security/Synology_SA_18_01",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
            },
            {
               name: "102376",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/102376",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
            },
            {
               name: "USN-3594-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3594-1/",
            },
            {
               name: "VU#584653",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/584653",
            },
            {
               name: "VU#180049",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/180049",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert.vde.com/en-us/advisories/vde-2018-003",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
            },
            {
               name: "SUSE-SU-2018:0009",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html",
            },
            {
               name: "USN-3690-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3690-1/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
            },
            {
               name: "USN-3549-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3549-1/",
            },
            {
               name: "SUSE-SU-2018:0007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.citrix.com/article/CTX231399",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://spectreattack.com/",
            },
            {
               name: "USN-3531-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3531-1/",
            },
            {
               name: "FreeBSD-SA-18:03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
            },
            {
               name: "SUSE-SU-2018:0006",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html",
            },
            {
               name: "USN-3581-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3581-1/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
            },
            {
               name: "1040071",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1040071",
            },
            {
               name: "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
            },
            {
               name: "USN-3597-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3597-2/",
            },
            {
               name: "USN-3581-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3581-2/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
            },
            {
               name: "SUSE-SU-2018:0010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html",
            },
            {
               name: "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html",
            },
            {
               name: "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel",
            },
            {
               name: "USN-3516-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/usn/usn-3516-1/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
            },
            {
               name: "43427",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "https://www.exploit-db.com/exploits/43427/",
            },
            {
               name: "SUSE-SU-2018:0020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html",
            },
            {
               name: "USN-3541-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3541-2/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.lenovo.com/us/en/solutions/LEN-18282",
            },
            {
               name: "USN-3777-3",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3777-3/",
            },
            {
               name: "openSUSE-SU-2018:0023",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
            },
            {
               name: "SUSE-SU-2018:0008",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
            },
            {
               name: "USN-3561-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3561-1/",
            },
            {
               name: "USN-3582-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3582-2/",
            },
            {
               name: "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Jun/36",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
            },
            {
               name: "FreeBSD-SA-19:26",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc",
            },
            {
               name: "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Nov/16",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.paloaltonetworks.com/CVE-2017-5715",
            },
            {
               name: "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html",
            },
            {
               name: "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2018-01-03T00:00:00",
               ID: "CVE-2017-5715",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Microprocessors with Speculative Execution",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
                     refsource: "CONFIRM",
                     url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
                  },
                  {
                     name: "USN-3560-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3560-1/",
                  },
                  {
                     name: "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html",
                  },
                  {
                     name: "DSA-4187",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2018/dsa-4187",
                  },
                  {
                     name: "USN-3542-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3542-2/",
                  },
                  {
                     name: "GLSA-201810-06",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/201810-06",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
                  },
                  {
                     name: "USN-3540-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3540-2/",
                  },
                  {
                     name: "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
                     refsource: "CONFIRM",
                     url: "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
                  },
                  {
                     name: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
                     refsource: "CONFIRM",
                     url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
                  },
                  {
                     name: "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html",
                  },
                  {
                     name: "USN-3597-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3597-1/",
                  },
                  {
                     name: "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html",
                  },
                  {
                     name: "SUSE-SU-2018:0012",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html",
                  },
                  {
                     name: "SUSE-SU-2018:0011",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html",
                  },
                  {
                     name: "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
                     refsource: "CONFIRM",
                     url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
                  },
                  {
                     name: "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
                     refsource: "MISC",
                     url: "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
                  },
                  {
                     name: "DSA-4213",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2018/dsa-4213",
                  },
                  {
                     name: "https://cert.vde.com/en-us/advisories/vde-2018-002",
                     refsource: "CONFIRM",
                     url: "https://cert.vde.com/en-us/advisories/vde-2018-002",
                  },
                  {
                     name: "DSA-4120",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2018/dsa-4120",
                  },
                  {
                     name: "openSUSE-SU-2018:0013",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html",
                  },
                  {
                     name: "USN-3580-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3580-1/",
                  },
                  {
                     name: "https://support.f5.com/csp/article/K91229003",
                     refsource: "CONFIRM",
                     url: "https://support.f5.com/csp/article/K91229003",
                  },
                  {
                     name: "USN-3531-3",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3531-3/",
                  },
                  {
                     name: "USN-3620-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3620-2/",
                  },
                  {
                     name: "openSUSE-SU-2018:0022",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html",
                  },
                  {
                     name: "USN-3582-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3582-1/",
                  },
                  {
                     name: "DSA-4188",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2018/dsa-4188",
                  },
                  {
                     name: "RHSA-2018:0292",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:0292",
                  },
                  {
                     name: "http://xenbits.xen.org/xsa/advisory-254.html",
                     refsource: "CONFIRM",
                     url: "http://xenbits.xen.org/xsa/advisory-254.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20180104-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20180104-0001/",
                  },
                  {
                     name: "SUSE-SU-2018:0019",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html",
                  },
                  {
                     name: "https://www.synology.com/support/security/Synology_SA_18_01",
                     refsource: "CONFIRM",
                     url: "https://www.synology.com/support/security/Synology_SA_18_01",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
                  },
                  {
                     name: "102376",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/102376",
                  },
                  {
                     name: "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
                     refsource: "CONFIRM",
                     url: "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
                  },
                  {
                     name: "USN-3594-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3594-1/",
                  },
                  {
                     name: "VU#584653",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/584653",
                  },
                  {
                     name: "VU#180049",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/180049",
                  },
                  {
                     name: "https://cert.vde.com/en-us/advisories/vde-2018-003",
                     refsource: "CONFIRM",
                     url: "https://cert.vde.com/en-us/advisories/vde-2018-003",
                  },
                  {
                     name: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
                     refsource: "CONFIRM",
                     url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
                  },
                  {
                     name: "SUSE-SU-2018:0009",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html",
                  },
                  {
                     name: "USN-3690-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3690-1/",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
                  },
                  {
                     name: "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
                     refsource: "CONFIRM",
                     url: "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
                  },
                  {
                     name: "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
                     refsource: "CONFIRM",
                     url: "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
                  },
                  {
                     name: "USN-3549-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3549-1/",
                  },
                  {
                     name: "SUSE-SU-2018:0007",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html",
                  },
                  {
                     name: "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
                     refsource: "CONFIRM",
                     url: "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
                  },
                  {
                     name: "https://support.citrix.com/article/CTX231399",
                     refsource: "CONFIRM",
                     url: "https://support.citrix.com/article/CTX231399",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                  },
                  {
                     name: "https://spectreattack.com/",
                     refsource: "MISC",
                     url: "https://spectreattack.com/",
                  },
                  {
                     name: "USN-3531-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3531-1/",
                  },
                  {
                     name: "FreeBSD-SA-18:03",
                     refsource: "FREEBSD",
                     url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc",
                  },
                  {
                     name: "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
                     refsource: "CONFIRM",
                     url: "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
                  },
                  {
                     name: "SUSE-SU-2018:0006",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html",
                  },
                  {
                     name: "USN-3581-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3581-1/",
                  },
                  {
                     name: "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
                     refsource: "CONFIRM",
                     url: "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
                  },
                  {
                     name: "1040071",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1040071",
                  },
                  {
                     name: "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html",
                  },
                  {
                     name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
                     refsource: "CONFIRM",
                     url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
                  },
                  {
                     name: "USN-3597-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3597-2/",
                  },
                  {
                     name: "USN-3581-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3581-2/",
                  },
                  {
                     name: "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
                     refsource: "CONFIRM",
                     url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
                  },
                  {
                     name: "SUSE-SU-2018:0010",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html",
                  },
                  {
                     name: "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html",
                  },
                  {
                     name: "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel",
                  },
                  {
                     name: "USN-3516-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/usn/usn-3516-1/",
                  },
                  {
                     name: "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
                     refsource: "CONFIRM",
                     url: "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
                  },
                  {
                     name: "43427",
                     refsource: "EXPLOIT-DB",
                     url: "https://www.exploit-db.com/exploits/43427/",
                  },
                  {
                     name: "SUSE-SU-2018:0020",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html",
                  },
                  {
                     name: "USN-3541-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3541-2/",
                  },
                  {
                     name: "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
                     refsource: "MISC",
                     url: "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
                  },
                  {
                     name: "https://support.lenovo.com/us/en/solutions/LEN-18282",
                     refsource: "CONFIRM",
                     url: "https://support.lenovo.com/us/en/solutions/LEN-18282",
                  },
                  {
                     name: "USN-3777-3",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3777-3/",
                  },
                  {
                     name: "openSUSE-SU-2018:0023",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html",
                  },
                  {
                     name: "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
                     refsource: "CONFIRM",
                     url: "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
                  },
                  {
                     name: "SUSE-SU-2018:0008",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html",
                  },
                  {
                     name: "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
                     refsource: "CONFIRM",
                     url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
                  },
                  {
                     name: "USN-3561-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3561-1/",
                  },
                  {
                     name: "USN-3582-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3582-2/",
                  },
                  {
                     name: "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Jun/36",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
                  },
                  {
                     name: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
                  },
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
                  },
                  {
                     name: "FreeBSD-SA-19:26",
                     refsource: "FREEBSD",
                     url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc",
                  },
                  {
                     name: "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Nov/16",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html",
                  },
                  {
                     name: "https://security.paloaltonetworks.com/CVE-2017-5715",
                     refsource: "CONFIRM",
                     url: "https://security.paloaltonetworks.com/CVE-2017-5715",
                  },
                  {
                     name: "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html",
                  },
                  {
                     name: "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2017-5715",
      datePublished: "2018-01-04T13:00:00Z",
      dateReserved: "2017-02-01T00:00:00",
      dateUpdated: "2024-09-17T03:28:57.728Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}