CWE-1342: Information Exposure through Microarchitectural State after Transient Execution
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The processor does not properly clear microarchitectural state after incorrect microcode assists or speculative execution, resulting in transient execution.
常见后果
影响范围: Confidentiality Integrity
技术影响: Modify Memory Read Memory Execute Unauthorized Code or Commands
潜在缓解措施
阶段: Architecture and Design Requirements
描述: Hardware ensures that no illegal data flows from faulting micro-ops exists at the microarchitectural level.
有效性: High
阶段: Build and Compilation
描述: Include instructions that explicitly remove traces of unneeded computations from software interactions with microarchitectural elements e.g. lfence, sfence, mfence, clflush.
有效性: High
观察示例
参考: CVE-2020-0551
Load value injection in some processors utilizing speculative execution may allow an authenticated user to enable information disclosure via a side-channel with local access.
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | - |
| Requirements | - |