CVE-2019-1125

CVSS v3.1 5.6 (Medium)
56% Progress
CVSS v2.0 2.1 (Low)
21% Progress
EPSS 0.12 % (47th)
0.12% Progress
Affected Products 15
Advisories 39
NVD Status Modified

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further.
On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125.
Microsoft released a security update on July 9, 2019 that addresses the vulnerability through a software change that mitigates how the CPU speculatively accesses memory. Note that this vulnerability does not require a microcode update from your device OEM.

Weaknesses
CWE-NVD-noinfo
Related CVEs
CVE Status
PUBLISHED
NVD Status
Modified
CNA
Microsoft Corporation
Published Date
2019-09-03 18:15:12
(5 years ago)
Updated Date
2024-05-29 17:15:57
(3 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Microsoft Windows 10 cpe:2.3:o:microsoft:windows_10:-
  Microsoft Windows 10 1607 cpe:2.3:o:microsoft:windows_10:1607
  Microsoft Windows 10 1703 cpe:2.3:o:microsoft:windows_10:1703
  Microsoft Windows 10 1709 cpe:2.3:o:microsoft:windows_10:1709
  Microsoft Windows 10 1803 cpe:2.3:o:microsoft:windows_10:1803
  Microsoft Windows 10 1809 cpe:2.3:o:microsoft:windows_10:1809
  Microsoft Windows 10 1903 cpe:2.3:o:microsoft:windows_10:1903
  Microsoft Windows 7 SP1 cpe:2.3:o:microsoft:windows_7:-:sp1
  Microsoft Windows 8.1 cpe:2.3:o:microsoft:windows_8.1:-
  Microsoft Windows Rt 8.1 cpe:2.3:o:microsoft:windows_rt_8.1:-
  Microsoft Windows Server 2008 SP2 cpe:2.3:o:microsoft:windows_server_2008:-:sp2
  Microsoft Windows Server 2008 R2 SP1 on Itanium cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium
  Microsoft Windows Server 2008 R2 SP1 on X64 cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64
  Microsoft Windows Server 2012 cpe:2.3:o:microsoft:windows_server_2012:-
  Microsoft Windows Server 2012 R2 cpe:2.3:o:microsoft:windows_server_2012:r2
  Microsoft Windows Server 2016 cpe:2.3:o:microsoft:windows_server_2016:-
  Microsoft Windows Server 2016 1803 cpe:2.3:o:microsoft:windows_server_2016:1803
  Microsoft Windows Server 2016 1903 cpe:2.3:o:microsoft:windows_server_2016:1903
  Microsoft Windows Server 2019 cpe:2.3:o:microsoft:windows_server_2019:-

Configuration #2

    CPE23 From Up To
  Redhat Virtualization Host 4.0 cpe:2.3:a:redhat:virtualization_host:4.0
  Redhat Enterprise Linux Desktop 7.0 cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  Redhat Enterprise Linux Server 7.0 cpe:2.3:o:redhat:enterprise_linux_server:7.0
  Redhat Enterprise Linux Server Aus 7.7 cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7
  Redhat Enterprise Linux Server Eus 7.7 cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7
  Redhat Enterprise Linux Server Tus 7.7 cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7
  Redhat Enterprise Linux Workstation 7.0 cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...