CVE-2017-5925

moderate-risk
Published 2017-02-27

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern Intel processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.

Do I need to act?

-
0.38% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10 High
NETWORK / LOW complexity

Affected Products (20)

A64
Athlon Ii 640 X4
Fx-8320 8-Core
Phenom 9550 4-Core
Celeron N2840
Core I5 M480
Core I7-2620Qm
Core I7-4500U
Core I7-6700K
Tegra K1 Cd580M-A1
E-350
Fx-8120 8-Core
Fx-8350 8-Core
Atom C2750
Core I7-3632Qm
Core I7 920
Xeon E3-1240 V5
Xeon E5-2658 V2
Tegra K1 Cd570M-A1
Exynos 5800

Affected Vendors

47
/ 100
moderate-risk
Severity 26/34 · High
Exploitability 1/34 · Minimal
Exposure 20/34 · Moderate