Vulnerability Database

328,409

Total vulnerabilities in the database

CVE-2018-3619

Information disclosure vulnerability in storage media in systems with Intel Optane memory module with Whole Disk Encryption may allow an attacker to recover data via physical access.

  • Published: Jul 10, 2018
  • Updated: Nov 9, 2025
  • CVE: CVE-2018-3619
  • Severity: Low
  • Exploit:

CVSS v2:

  • Severity: Low
  • Score: 2.1
  • AV:L/AC:L/Au:N/C:P/I:N/A:N

CWEs:

Software From Fixed in
intel / core_i7 8550u 8550u.x
intel / core_i7 8650u 8650u.x
intel / core_i7 8700 8700.x
intel / core_i7 8700k 8700k.x
intel / core_i7 7920hq 7920hq.x
intel / core_i7 7820hq 7820hq.x
intel / core_i7 7820hk 7820hk.x
intel / core_i7 7820eq 7820eq.x
intel / core_i7 7700hq 7700hq.x
intel / core_i7 7700 7700.x
intel / core_i7 7700k 7700k.x
intel / core_i7 7700t 7700t.x
intel / core_i7 7660u 7660u.x
intel / core_i7 7600u 7600u.x
intel / core_i7 7567u 7567u.x
intel / core_i7 7560u 7560u.x
intel / core_i7 7500u 7500u.x
intel / core_i7 7y75 7y75.x
intel / core_i7 8809g 8809g.x
intel / core_i7 8709g 8709g.x
intel / core_i7 8706g 8706g.x
intel / core_i7 8705g 8705g.x
intel / core_i7 8750h 8750h.x
intel / core_i7 8700t 8700t.x
intel / core_i7 8700b 8700b.x
intel / core_i7 8565u 8565u.x
intel / core_i7 8559u 8559u.x
intel / core_i7 8500y 8500y.x
intel / core_i7 8086k 8086k.x
intel / core_i7 8850h 8850h.x
intel / core_i5 8350u 8350u.x
intel / core_i5 8250u 8250u.x
intel / core_i5 8400 8400.x
intel / core_i5 8600k 8600k.x
intel / core_i5 8600 8600.x
intel / core_i5 8500t 8500t.x
intel / core_i5 8500b 8500b.x
intel / core_i5 8500 8500.x
intel / core_i5 8400t 8400t.x
intel / core_i5 8400h 8400h.x
intel / core_i5 8400b 8400b.x
intel / core_i5 8305g 8305g.x
intel / core_i5 8300h 8300h.x
intel / core_i5 8269u 8269u.x
intel / core_i5 8265u 8265u.x
intel / core_i5 8259u 8259u.x
intel / core_i5 8200y 8200y.x
intel / core_i5 8600t 8600t.x
intel / core_i5 7600t 7600t.x
intel / core_i5 7600 7600.x
intel / core_i5 7500 7500.x
intel / core_i5 7500t 7500t.x
intel / core_i5 7442eq 7442eq.x
intel / core_i5 7440hq 7440hq.x
intel / core_i5 7440eq 7440eq.x
intel / core_i5 7400t 7400t.x
intel / core_i5 7400 7400.x
intel / core_i5 7360u 7360u.x
intel / core_i5 7300u 7300u.x
intel / core_i5 7300hq 7300hq.x
intel / core_i5 7287u 7287u.x
intel / core_i5 7267u 7267u.x
intel / core_i5 7260u 7260u.x
intel / core_i5 7200u 7200u.x
intel / core_i5 7y57 7y57.x
intel / core_i5 7y54 7y54.x
intel / core_i5 7600k 7600k.x
intel / core_i3 8100 8100.x
intel / core_i3 8350k 8350k.x
intel / core_i3 8300 8300.x
intel / core_i3 8300t 8300t.x
intel / core_i3 8145u 8145u.x
intel / core_i3 8130u 8130u.x
intel / core_i3 8109u 8109u.x
intel / core_i3 8100h 8100h.x
intel / core_i3 8100t 8100t.x
intel / core_i3 7320 7320.x
intel / core_i3 7300 7300.x
intel / core_i3 7300t 7300t.x
intel / core_i3 7130u 7130u.x
intel / core_i3 7102e 7102e.x
intel / core_i3 7101e 7101e.x
intel / core_i3 7101te 7101te.x
intel / core_i3 7100t 7100t.x
intel / core_i3 7100e 7100e.x
intel / core_i3 7100 7100.x
intel / core_i3 7167u 7167u.x
intel / core_i3 7100u 7100u.x
intel / core_i3 7100h 7100h.x
intel / core_i3 7020u 7020u.x
intel / core_i3 7350k 7350k.x
intel / core_i9 8950hk 8950hk.x
intel / core_m3 8100y 8100y.x
intel / core_i7 6950x 6950x.x
intel / core_i7 6900k 6900k.x
intel / core_i7 6850k 6850k.x
intel / core_i7 6800k 6800k.x
intel / core_i7 5960x 5960x.x
intel / core_i7 5930k 5930k.x
intel / core_i7 5820k 5820k.x
intel / core_i7 4960x 4960x.x
intel / core_i7 4940mx 4940mx.x
intel / core_i7 4930k 4930k.x
intel / core_i7 4930mx 4930mx.x
intel / core_i7 4820k 4820k.x
intel / core_i7 3970x 3970x.x
intel / core_i7 3960x 3960x.x
intel / core_i7 3940xm 3940xm.x
intel / core_i7 3930k 3930k.x
intel / core_i7 3920xm 3920xm.x
intel / core_i7 3820 3820.x
intel / core_i5 7640x 7640x.x
intel / core_i7 7800x 7800x.x
intel / core_i7 7740x 7740x.x
intel / core_i7 7820x 7820x.x
intel / core_i9 7960x 7960x.x
intel / core_i9 7940x 7940x.x
intel / core_i9 7920x 7920x.x
intel / core_i9 7900x 7900x.x
intel / core_i9 7980xe 7980xe.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.