### [CVE-2018-3665](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665) ![](https://img.shields.io/static/v1?label=Product&message=Intel%20Core-based%20microprocessors&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) ### Description System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel. ### POC #### Reference - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - https://usn.ubuntu.com/3696-1/ - https://usn.ubuntu.com/3696-1/ - https://usn.ubuntu.com/3698-1/ - https://usn.ubuntu.com/3698-1/ - https://usn.ubuntu.com/3698-2/ - https://usn.ubuntu.com/3698-2/ - https://www.oracle.com/security-alerts/cpujul2020.html - https://www.oracle.com/security-alerts/cpujul2020.html #### Github - https://github.com/Lee-1109/SpeculativeAttackPoC - https://github.com/codexlynx/hardware-attacks-state-of-the-art - https://github.com/github-3rr0r/TEApot - https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance