Intel Microarchitectural Data Sampling Advisory

    Intel Microarchitectural Data Sampling Advisory

    Intel Microarchitectural Data Sampling Advisory

    Potential security vulnerability in CPUs may allow information disclosure.

    Last Updated: 26 May 2019 at 08:04

    Intel ID: INTEL-SA-00233
    Advisory Category: Hardware
    Impact of vulnerability: Information Disclosure
    Severity rating: MEDIUM
    Original release: 05/14/2019
    Last revised: 05/14/2019

    Summary:

    A potential security vulnerability in CPUs may allow information disclosure. Intel is releasing Microcode Updates (MCU) updates to mitigate this potential vulnerability.

    Vulnerability Details:

    CVEID: CVE-2018-12126
    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
    CVSS Base Score: 6.5 Medium
    CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

    CVEID: CVE-2018-12127
    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
    CVSS Base Score: 6.5 Medium
    CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

    CVEID: CVE-2018-12130
    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
    CVSS Base Score: 6.5 Medium
    CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

    CVEID: CVE-2019-11091
    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
    CVSS Base Score: 3.8 Low
    CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

    Affected Products:

    A list of impacted products can be found here.

    Recommendation:

    Intel has worked with operating system vendors, equipment manufacturers, and other ecosystem partners to develop platform firmware and software updates that can help protect systems from these methods. This includes the release of updated Intel microprocessor microcode to our customers and partners.

    Status of available microcode can be found here.

    Public Github: https://github.com/intel/Intel-Linux...ode-Data-Files

    End users and systems administrators should check with their system manufacturers and system software vendors and apply any available updates as soon as practical.

    Acknowledgements:

    Microarchitectural Store Buffer Data Sampling (MSBDS) - CVE-2018-12126: This vulnerability was found internally by Intel employees. Intel would like to thank Ke Sun, Henrique Kawakami, Kekai Hu and Rodrigo Branco. It was independently reported by Lei Shi - Qihoo - 360 CERT and by Marina Minkin1, Daniel Moghimi2, Moritz Lipp3, Michael Schwarz3, Jo Van Bulck4, Daniel Genkin1, Daniel Gruss3, Berk Sunar2, Frank Piessens4, Yuval Yarom5 (1University of Michigan, 2Worcester Polytechnic Institute, 3Graz University of Technology, 4imec-DistriNet, KU Leuven, 5University of Adelaide).

    Microarchitectural Load Port Data Sampling (MLPDS) - CVE-2018-12127: This vulnerability was found internally by Intel employees and Microsoft. Intel would like to thank Brandon Falk – Microsoft Windows Platform Security Team, Ke Sun, Henrique Kawakami, Kekai Hu, and Rodrigo Branco - Intel. It was independently reported by Matt Miller – Microsoft, and by Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida - VUSec group at VU Amsterdam.

    Microarchitectural Fill Buffer Data Sampling (MFBDS) - CVE-2018-12130: This vulnerability was found internally by Intel employees. Intel would like to thank Ke Sun, Henrique Kawakami, Kekai Hu and Rodrigo Branco. It was independently reported by Giorgi Maisuradze – Microsoft Research, and by Dan Horea Lutas, and Andrei Lutas - Bitdefender, and by Volodymyr Pikhur, and by Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida - VUSec group at VU Amsterdam, and by Moritz Lipp, Michael Schwarz, and Daniel Gruss - Graz University of Technology.

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM) – CVE-2019-11091: This vulnerability was found internally by Intel employees. Intel would like to thank Ke Sun, Henrique Kawakami, Kekai Hu and Rodrigo Branco. It was independently found by Volodrmyr Pikhur, and by Moritz Lipp, Michael Schwarz, Daniel Gruss - Graz University of Technology, and by Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida - VUSec group at VU Amsterdam.

    Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.

    Revision History

    Revision Date Description
    1.0 05/14/2019 Initial Release

    Source: https://www.intel.com/content/www/us...-sa-00233.html

    See also:
    Brink's Avatar Posted By: Brink
    15 May 2019


  1. Posts : 1,560
    Windows 10 Home 20H2 64-bit
       #1

    My CPU is in the green, but do I seriously have to wait for a BIOS update for my motherboard? Because I don't think MSI will provide one for me due to it being EoL, unless they are obligated to do so?

    I am getting tired of all of these Intel vulnerabilities... Makes me really consider going for AMD on my next main build. Too bad they lack the same gaming performance as Intel, which is the only reason I am hesitant.
      My Computer


  2. Posts : 27,182
    Win11 Pro, Win10 Pro N, Win10 Home, Windows 8.1 Pro, Ubuntu
       #2

    Faith said:
    My CPU is in the green, but do I seriously have to wait for a BIOS update for my motherboard? Because I don't think MSI will provide one for me due to it being EoL, unless they are obligated to do so?
    The one for Windows 10 only protects while in Windows 10.
    If you dual boot or multi-boot a BIOS uCU is better.
    But even LINUX kernel already has the update, my UBUNTU already got it.
      My Computers


  3. Posts : 68,917
    64-bit Windows 11 Pro for Workstations
    Thread Starter
       #3
      My Computers


  4. Posts : 7,724
    3-Win-7Prox64 3-Win10Prox64 3-LinuxMint20.2
       #4
      My Computers


  5. Posts : 27,182
    Win11 Pro, Win10 Pro N, Win10 Home, Windows 8.1 Pro, Ubuntu
       #5

    These vulnerabilities are all being blown out of proportion.
    By the hackers who found them so they can get more reward money from Intel, and more press so the get paid better by other customers.

    And by the "press" for clickbait.
      My Computers


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 02:48.
Find Us




Windows 10 Forums