![]() Logo designed for the vulnerabilities, featuring a wounded hand holding a broken microprocessor | |
CVE identifier(s) | CVE-2018-12126 (Fallout), CVE-2018-12127 (RIDL), CVE-2019-11091 (RIDL, ZombieLoad), CVE-2018-12130 (RIDL, ZombieLoad), CVE-2019-11135 (ZombieLoad v2) |
---|---|
Date discovered | 2018[1] |
Date patched | 14 May 2019 |
Discoverer | ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Affected hardware | Pre-April 2019 Intel x86 microprocessors |
Website | mdsattacks.com ZombieLoadAttack.com |
The Microarchitectural Data Sampling (MDS) vulnerabilities are a set of weaknesses in Intel x86 microprocessors that use hyper-threading, and leak data across protection boundaries that are architecturally supposed to be secure. The attacks exploiting the vulnerabilities have been labeled Fallout, RIDL (Rogue In-Flight Data Load), ZombieLoad.,[2][3][4] and ZombieLoad 2.[5]
Greenberg
was invoked but never defined (see the help page).
new
was invoked but never defined (see the help page).
© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search