Vulnerability Database

328,409

Total vulnerabilities in the database

CVE-2018-3615

Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.

  • Published: Aug 14, 2018
  • Updated: Nov 9, 2025
  • CVE: CVE-2018-3615
  • Severity: Medium
  • Exploit:

CVSS v2:

  • Severity: Medium
  • Score: 5.4
  • AV:L/AC:M/Au:N/C:C/I:P/A:N

CWEs:

Software From Fixed in
intel / core_i5 6600 6600.x
intel / core_i5 6685r 6685r.x
intel / core_i5 6600k 6600k.x
intel / core_i5 6600t 6600t.x
intel / core_i5 6585r 6585r.x
intel / core_i5 6500 6500.x
intel / core_i5 6500t 6500t.x
intel / core_i5 6500te 6500te.x
intel / core_i5 6402p 6402p.x
intel / core_i5 6400 6400.x
intel / core_i5 6400t 6400t.x
intel / core_i5 6440eq 6440eq.x
intel / core_i5 6440hq 6440hq.x
intel / core_i5 6442eq 6442eq.x
intel / core_i5 6360u 6360u.x
intel / core_i5 6350hq 6350hq.x
intel / core_i5 6300hq 6300hq.x
intel / core_i5 6300u 6300u.x
intel / core_i5 6200u 6200u.x
intel / core_i5 6260u 6260u.x
intel / core_i5 6267u 6267u.x
intel / core_i5 6287u 6287u.x
intel / core_i3 6300 6300.x
intel / core_i3 6300t 6300t.x
intel / core_i3 6320 6320.x
intel / core_i3 6100e 6100e.x
intel / core_i3 6100h 6100h.x
intel / core_i3 6100u 6100u.x
intel / core_i3 6102e 6102e.x
intel / core_i3 6157u 6157u.x
intel / core_i3 6167u 6167u.x
intel / core_i3 6100 6100.x
intel / core_i3 6100t 6100t.x
intel / core_i3 6100te 6100te.x
intel / core_i3 6006u 6006u.x
intel / core_i3 6098p 6098p.x
intel / core_i5 680 680.x
intel / core_i5 670 670.x
intel / core_i5 661 661.x
intel / core_i5 660 660.x
intel / core_i5 655k 655k.x
intel / core_i5 650 650.x
intel / core_i7 610e 610e.x
intel / core_i7 680um 680um.x
intel / core_i7 660um 660um.x
intel / core_i7 660ue 660ue.x
intel / core_i7 660lm 660lm.x
intel / core_i7 640um 640um.x
intel / core_i7 640m 640m.x
intel / core_i7 640lm 640lm.x
intel / core_i7 620um 620um.x
intel / core_i7 620ue 620ue.x
intel / core_i7 620m 620m.x
intel / core_i7 620lm 620lm.x
intel / core_i7 620le 620le.x
intel / core_i7 7920hq 7920hq.x
intel / core_i7 7820hq 7820hq.x
intel / core_i7 7820hk 7820hk.x
intel / core_i7 7820eq 7820eq.x
intel / core_i7 7700hq 7700hq.x
intel / core_i7 7700 7700.x
intel / core_i7 7700k 7700k.x
intel / core_i7 7700t 7700t.x
intel / core_i7 7660u 7660u.x
intel / core_i7 7600u 7600u.x
intel / core_i7 7567u 7567u.x
intel / core_i7 7560u 7560u.x
intel / core_i7 7500u 7500u.x
intel / core_i7 7y75 7y75.x
intel / core_i5 760 760.x
intel / core_i5 750s 750s.x
intel / core_i5 750 750.x
intel / core_i7 720qm 720qm.x
intel / core_i7 740qm 740qm.x
intel / core_i7 8550u 8550u.x
intel / core_i7 8650u 8650u.x
intel / core_i7 8700 8700.x
intel / core_i7 8700k 8700k.x
intel / core_i5 8350u 8350u.x
intel / core_i5 8250u 8250u.x
intel / core_i5 8400 8400.x
intel / core_i5 8600k 8600k.x
intel / core_i3 8100 8100.x
intel / core_i3 8350k 8350k.x
intel / core_i7 860 860.x
intel / core_i7 820qm 820qm.x
intel / core_i7 880 880.x
intel / core_i7 875k 875k.x
intel / core_i7 870s 870s.x
intel / core_i7 870 870.x
intel / core_i7 860s 860s.x
intel / core_i7 840qm 840qm.x
intel / xeon_e3 1585_v5 1585_v5.x
intel / xeon_e3 1585l_v5 1585l_v5.x
intel / xeon_e3 1578l_v5 1578l_v5.x
intel / xeon_e3 1575m_v5 1575m_v5.x
intel / xeon_e3 1565l_v5 1565l_v5.x
intel / xeon_e3 1558l_v5 1558l_v5.x
intel / xeon_e3 1545m_v5 1545m_v5.x
intel / xeon_e3 1535m_v5 1535m_v5.x
intel / xeon_e3 1515m_v5 1515m_v5.x
intel / xeon_e3 1535m_v6 1535m_v6.x
intel / xeon_e3 1505m_v6 1505m_v6.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.