### [CVE-2018-3639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639) ![](https://img.shields.io/static/v1?label=Product&message=Multiple&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) ### Description Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. ### POC #### Reference - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - https://seclists.org/bugtraq/2019/Jun/36 - https://seclists.org/bugtraq/2019/Jun/36 - https://usn.ubuntu.com/3777-3/ - https://usn.ubuntu.com/3777-3/ - https://www.exploit-db.com/exploits/44695/ - https://www.exploit-db.com/exploits/44695/ - https://www.kb.cert.org/vuls/id/180049 - https://www.kb.cert.org/vuls/id/180049 - https://www.oracle.com/security-alerts/cpujul2020.html - https://www.oracle.com/security-alerts/cpujul2020.html - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/C0dak/linux-exploit - https://github.com/CKExploits/pwnlinux - https://github.com/PooyaAlamirpour/willyb321-stars - https://github.com/Shuiliusheng/CVE-2018-3639-specter-v4- - https://github.com/ambynotcoder/C-libraries - https://github.com/amstelchen/smc_gui - https://github.com/carloscn/raspi-aft - https://github.com/codexlynx/hardware-attacks-state-of-the-art - https://github.com/danswinus/HWFW - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/edsonjt81/spectre-meltdown - https://github.com/es0j/hyperbleed - https://github.com/fengjixuchui/CPU-vulnerabiility-collections - https://github.com/github-3rr0r/TEApot - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/houjingyi233/CPU-vulnerability-collections - https://github.com/interlunar/win10-regtweak - https://github.com/ionescu007/SpecuCheck - https://github.com/jessb321/willyb321-stars - https://github.com/jinb-park/linux-exploit - https://github.com/kali973/spectre-meltdown-checker - https://github.com/kaosagnt/ansible-everyday - https://github.com/kdn111/linux-kernel-exploitation - https://github.com/kevincoakley/puppet-spectre_meltdown - https://github.com/khanhdn111/linux-kernel-exploitation - https://github.com/khanhdz-06/linux-kernel-exploitation - https://github.com/khanhdz191/linux-kernel-exploitation - https://github.com/khanhhdz/linux-kernel-exploitation - https://github.com/khanhhdz06/linux-kernel-exploitation - https://github.com/khanhnd123/linux-kernel-exploitation - https://github.com/kin-cho/my-spectre-meltdown-checker - https://github.com/knd06/linux-kernel-exploitation - https://github.com/malindarathnayake/Intel-CVE-2018-3639-Mitigation_RegistryUpdate - https://github.com/merlinepedra/spectre-meltdown-checker - https://github.com/merlinepedra25/spectre-meltdown-checker - https://github.com/microsoft/SpeculationControl - https://github.com/milouk/Efficient-Computing-in-a-Safe-Environment - https://github.com/mjaggi-cavium/spectre-meltdown-checker - https://github.com/mmxsrup/CVE-2018-3639 - https://github.com/morning21/Spectre_Meltdown_MDS_srcs - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/nmosier/clou-bugs - https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance - https://github.com/pathakabhi24/Awesome-C - https://github.com/rosenbergj/cpu-report - https://github.com/savchenko/windows10 - https://github.com/simeononsecurity/Windows-Spectre-Meltdown-Mitigation-Script - https://github.com/speed47/spectre-meltdown-checker - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/timidri/puppet-meltdown - https://github.com/tyhicks/ssbd-tools - https://github.com/uhub/awesome-c - https://github.com/v-lavrentikov/meltdown-spectre - https://github.com/vintagesucks/awesome-stars - https://github.com/vurtne/specter---meltdown--checker - https://github.com/willyb321/willyb321-stars - https://github.com/xairy/linux-kernel-exploitation - https://github.com/yardenshafir/MitigationFlagsCliTool