Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2018-3640 CVE-2018-3639 CVE-2018-3620 |
CWE-ID | CWE-362 CWE-200 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
EMC Isilon OneFS Client/Desktop applications / Software for system administration |
Vendor | Dell |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU12914
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2018-3640
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to race conditions in CPU cache processing. A local attacker can conduct a side-channel attack to exploit a flaw in the speculative loading of system registers to read privileged system registers
Note: the vulnerability is referred to as "Spectre variant 3A".
Install update from vendor's website.
Vulnerable software versionsEMC Isilon OneFS: before 8.1.2.0
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU12911
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2018-3639
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to race conditions in CPU cache processing. A local attacker can conduct a side-channel attack to exploit a flaw in the speculative execution of Load and Store instructions to read privileged memory.
Note: the vulnerability is referred to as "Spectre variant 4".
Install update from vendor's website.
Vulnerable software versionsEMC Isilon OneFS: before 8.1.2.0
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU14411
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2018-3620
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to an error in systems with microprocessors utilizing speculative execution and address translations . A local attacker can trigger terminal page fault, conduct side-channel attack and gain access to potentially sensitive information residing in the L1 data cache.
Install update from vendor's website.
Vulnerable software versionsEMC Isilon OneFS: before 8.1.2.0
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?