PT-2018-1446 · Vmware+8 · Workstation+12

Published

2018-01-03

·

Updated

2026-03-10

·

CVE-2018-3646

CVSS v3.1

5.6

Medium

AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Name of the Vulnerable Software and Affected Versions Intel processors versions prior to the fixed version Huawei VRP (affected versions not specified) vCenter Server (affected versions not specified) ESXi (affected versions not specified) Workstation (affected versions not specified) Fusion (affected versions not specified)
Description The issue is related to speculative execution and address translations, which may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. This may allow a malicious VM running on a given CPU core to effectively read the hypervisor’s or another VM’s privileged information that resides sequentially or concurrently in the same core’s L1 Data cache.
Recommendations For Intel processors, update to a version that includes the fix for this issue. For Huawei VRP, at the moment, there is no information about a newer version that contains a fix for this vulnerability. For vCenter Server, apply the available patches to secure against this vulnerability. For ESXi, apply the available patches to secure against this vulnerability. For Workstation, apply the available Hypervisor-Specific Mitigations for L1 Terminal Fault - VMM. For Fusion, apply the available Hypervisor-Specific Mitigations for L1 Terminal Fault - VMM.

Exploit

Weakness Enumeration

Related Identifiers

ALT-PU-2018-2253
BDU:2018-00996
CESA-2018_2384
CESA-2018_2390
CVE-2018-3646
DLA-1481-1
DLA-1506-1
DSA-4274-1
DSA-4279-1
DSA-4279-2
MGASA-2018-0344
MGASA-2018-0345
MGASA-2018-0346
MGASA-2018-0347
OPENSUSE-SU-2018_2399-1
OPENSUSE-SU-2018_2404-1
OPENSUSE-SU-2018_2407-1
OPENSUSE-SU-2018_2434-1
OPENSUSE-SU-2018_2436-1
OPENSUSE-SU-2018_4304-1
OPENSUSE-SU-2024:11520-1
RHSA-2018:2384
RHSA-2018:2387
RHSA-2018:2388
RHSA-2018:2389
RHSA-2018:2390
RHSA-2018:2391
RHSA-2018:2392
RHSA-2018:2393
RHSA-2018:2394
RHSA-2018:2395
RHSA-2018:2396
RHSA-2018:2402
RHSA-2018:2403
RHSA-2018:2404
RHSA-2018:2602
RHSA-2018:2603
RHSA-2018_2384
RHSA-2018_2390
RHSA-2018_2395
RHSA-2018_2602
SUSE-SU-2018:2328-1
SUSE-SU-2018:2331-1
SUSE-SU-2018:2331-2
SUSE-SU-2018:2332-1
SUSE-SU-2018:2335-1
SUSE-SU-2018:2338-1
SUSE-SU-2018:2341-1
SUSE-SU-2018:2342-1
SUSE-SU-2018:2344-1
SUSE-SU-2018:2344-2
SUSE-SU-2018:2345-1
SUSE-SU-2018:2346-1
SUSE-SU-2018:2347-1
SUSE-SU-2018:2348-1
SUSE-SU-2018:2349-1
SUSE-SU-2018:2350-1
SUSE-SU-2018:2351-1
SUSE-SU-2018:2352-1
SUSE-SU-2018:2353-1
SUSE-SU-2018:2354-1
SUSE-SU-2018:2355-1
SUSE-SU-2018:2356-1
SUSE-SU-2018:2358-1
SUSE-SU-2018:2359-1
SUSE-SU-2018:2362-1
SUSE-SU-2018:2363-1
SUSE-SU-2018:2364-1
SUSE-SU-2018:2366-1
SUSE-SU-2018:2367-1
SUSE-SU-2018:2368-1
SUSE-SU-2018:2369-1
SUSE-SU-2018:2374-1
SUSE-SU-2018:2380-1
SUSE-SU-2018:2381-1
SUSE-SU-2018:2384-1
SUSE-SU-2018:2387-1
SUSE-SU-2018:2389-1
SUSE-SU-2018:2391-1
SUSE-SU-2018:2394-1
SUSE-SU-2018:2401-1
SUSE-SU-2018:2409-1
SUSE-SU-2018:2410-1
SUSE-SU-2018:2410-2
SUSE-SU-2018:2413-1
SUSE-SU-2018:2414-1
SUSE-SU-2018:2416-1
SUSE-SU-2018:2426-1
SUSE-SU-2018:2450-1
SUSE-SU-2018:2472-1
SUSE-SU-2018:2473-1
SUSE-SU-2018:2474-1
SUSE-SU-2018:2480-1
SUSE-SU-2018:2482-1
SUSE-SU-2018:2483-1
SUSE-SU-2018:2528-1
SUSE-SU-2018:2596-1
SUSE-SU-2018:2637-1
SUSE-SU-2018:2963-1
SUSE-SU-2018:3490-1
SUSE-SU-2018:4300-1
SUSE-SU-2018_2401-1
SUSE-SU-2018_2409-1
SUSE-SU-2018_2410-1
SUSE-SU-2018_2410-2
SUSE-SU-2018_2426-1
SUSE-SU-2018_2473-1
SUSE-SU-2018_2480-1
SUSE-SU-2018_2482-1
SUSE-SU-2018_2483-1
USN-3740-1
USN-3740-2
USN-3741-1
USN-3741-2
USN-3741-3
USN-3742-1
USN-3742-2
USN-3756-1
USN-3823-1

Affected Products

Alt Linux
Centos
Esxi
Freebsd
Fusion
Huawei Vrp
Intel Processors
Red Hat
Suse
Ubuntu
Vmware Vcenter
Workstation
Vcenter Server