Side-Channel Attack Vulnerability in Intel Processors
CVE-2017-5925

7.5HIGH

Key Information:

Vendor
Intel
Vendor
CVE Published:
27 February 2017

Summary

This vulnerability arises from the behavior of the Memory Management Unit (MMU) during virtual to physical address translation, which can leave trace data in the last level cache of modern Intel processors. An attacker can exploit this information through a side-channel attack to leak sensitive data and code pointers from JavaScript, effectively circumventing Address Space Layout Randomization (ASLR) protections. This compromise showcases the potential of cache analysis techniques to undermine confidentiality and integrity within affected systems.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.