### [CVE-2018-12127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127) ![](https://img.shields.io/static/v1?label=Product&message=Central%20Processing%20Units%20(CPUs)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) ### Description Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf ### POC #### Reference - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html - http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html - https://seclists.org/bugtraq/2019/Jun/28 - https://seclists.org/bugtraq/2019/Jun/28 - https://seclists.org/bugtraq/2019/Jun/36 - https://seclists.org/bugtraq/2019/Jun/36 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/amstelchen/smc_gui - https://github.com/codexlynx/hardware-attacks-state-of-the-art - https://github.com/edsonjt81/spectre-meltdown - https://github.com/es0j/hyperbleed - https://github.com/giterlizzi/secdb-feeds - https://github.com/j1nh0/nisol - https://github.com/j1nh0/pdf - https://github.com/j1nh0/pdf_esxi - https://github.com/j1nh0/pdf_systems - https://github.com/kali973/spectre-meltdown-checker - https://github.com/kaosagnt/ansible-everyday - https://github.com/kin-cho/my-spectre-meltdown-checker - https://github.com/merlinepedra/spectre-meltdown-checker - https://github.com/merlinepedra25/spectre-meltdown-checker - https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance - https://github.com/savchenko/windows10 - https://github.com/simeononsecurity/Windows-Spectre-Meltdown-Mitigation-Script - https://github.com/speed47/spectre-meltdown-checker - https://github.com/timidri/puppet-meltdown