{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T18:10:05.400","vulnerabilities":[{"cve":{"id":"CVE-2018-12126","sourceIdentifier":"secure@intel.com","published":"2019-05-30T16:29:00.870","lastModified":"2024-11-21T03:44:38.583","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/corporate-information\/SA00233-microcode-update-guidance_05132019.pdf"},{"lang":"es","value":"En Microarchitectural Store Buffer Data Sampling (MSBDS): los búferes de almacenamiento en algunos microprocesadores que usan ejecución especulativa pueden permitir que un usuario autenticado active potencialmente la divulgación de información por medio de un canal lateral con acceso local. Puede encontrar una lista de los productos impactados aquí: https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/documents\/corporate-information\/SA00233-microcode-update-guidance_05132019.pdf."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:N\/S:C\/C:H\/I:N\/A:N","baseScore":5.6,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.1,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L\/AC:M\/Au:N\/C:C\/I:N\/A:N","baseScore":4.7,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intel:microarchitectural_store_buffer_data_sampling_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"F8118C0B-EBAE-43BF-8F2B-19E16BF6BAA9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intel:microarchitectural_store_buffer_data_sampling:-:*:*:*:*:*:*:*","matchCriteriaId":"3E47DEBF-9DD8-4D69-BB15-04AB1448C150"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","matchCriteriaId":"D100F7CE-FC64-4CC6-852A-6136D72DA419"}]}]}],"references":[{"url":"http:\/\/lists.opensuse.org\/opensuse-security-announce\/2019-06\/msg00014.html","source":"secure@intel.com"},{"url":"http:\/\/lists.opensuse.org\/opensuse-security-announce\/2019-07\/msg00052.html","source":"secure@intel.com"},{"url":"http:\/\/lists.opensuse.org\/opensuse-security-announce\/2019-07\/msg00053.html","source":"secure@intel.com"},{"url":"http:\/\/packetstormsecurity.com\/files\/155281\/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html","source":"secure@intel.com"},{"url":"http:\/\/www.arubanetworks.com\/assets\/alert\/ARUBA-PSA-2019-003.txt","source":"secure@intel.com"},{"url":"http:\/\/www.huawei.com\/en\/psirt\/security-advisories\/huawei-sa-20190712-01-mds-en","source":"secure@intel.com"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2019:1455","source":"secure@intel.com"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2019:2553","source":"secure@intel.com"},{"url":"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-608355.pdf","source":"secure@intel.com"},{"url":"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-616472.pdf","source":"secure@intel.com"},{"url":"https:\/\/kc.mcafee.com\/corporate\/index?page=content&id=SB10292","source":"secure@intel.com"},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2019\/06\/msg00018.html","source":"secure@intel.com"},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce%40lists.fedoraproject.org\/message\/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4\/","source":"secure@intel.com"},{"url":"https:\/\/seclists.org\/bugtraq\/2019\/Jun\/28","source":"secure@intel.com"},{"url":"https:\/\/seclists.org\/bugtraq\/2019\/Jun\/36","source":"secure@intel.com"},{"url":"https:\/\/seclists.org\/bugtraq\/2019\/Nov\/15","source":"secure@intel.com"},{"url":"https:\/\/seclists.org\/bugtraq\/2019\/Nov\/16","source":"secure@intel.com"},{"url":"https:\/\/seclists.org\/bugtraq\/2020\/Jan\/21","source":"secure@intel.com"},{"url":"https:\/\/security.FreeBSD.org\/advisories\/FreeBSD-SA-19:26.mcu.asc","source":"secure@intel.com"},{"url":"https:\/\/security.gentoo.org\/glsa\/202003-56","source":"secure@intel.com"},{"url":"https:\/\/usn.ubuntu.com\/3977-3\/","source":"secure@intel.com"},{"url":"https:\/\/www.debian.org\/security\/2020\/dsa-4602","source":"secure@intel.com"},{"url":"https:\/\/www.freebsd.org\/security\/advisories\/FreeBSD-SA-19:07.mds.asc","source":"secure@intel.com"},{"url":"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00233.html","source":"secure@intel.com","tags":["Vendor Advisory"]},{"url":"https:\/\/www.synology.com\/security\/advisory\/Synology_SA_19_24","source":"secure@intel.com"},{"url":"http:\/\/lists.opensuse.org\/opensuse-security-announce\/2019-06\/msg00014.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/lists.opensuse.org\/opensuse-security-announce\/2019-07\/msg00052.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/lists.opensuse.org\/opensuse-security-announce\/2019-07\/msg00053.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/packetstormsecurity.com\/files\/155281\/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/www.arubanetworks.com\/assets\/alert\/ARUBA-PSA-2019-003.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/www.huawei.com\/en\/psirt\/security-advisories\/huawei-sa-20190712-01-mds-en","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2019:1455","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2019:2553","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-608355.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-616472.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/kc.mcafee.com\/corporate\/index?page=content&id=SB10292","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2019\/06\/msg00018.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce%40lists.fedoraproject.org\/message\/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4\/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/seclists.org\/bugtraq\/2019\/Jun\/28","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/seclists.org\/bugtraq\/2019\/Jun\/36","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/seclists.org\/bugtraq\/2019\/Nov\/15","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/seclists.org\/bugtraq\/2019\/Nov\/16","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/seclists.org\/bugtraq\/2020\/Jan\/21","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/security.FreeBSD.org\/advisories\/FreeBSD-SA-19:26.mcu.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/security.gentoo.org\/glsa\/202003-56","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/usn.ubuntu.com\/3977-3\/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/www.debian.org\/security\/2020\/dsa-4602","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/www.freebsd.org\/security\/advisories\/FreeBSD-SA-19:07.mds.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00233.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https:\/\/www.synology.com\/security\/advisory\/Synology_SA_19_24","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}