Intel Atom C
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Intel Atom C.
By the Year
In 2025 there have been 0 vulnerabilities in Intel Atom C. Atom C did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 8 | 5.84 |
It may take a day or so for new Atom C vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Intel Atom C Security Vulnerabilities
Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family
CVE-2018-3652
7.6 - High
- July 10, 2018
Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces.
Information Disclosure
Systems with microprocessors utilizing speculative execution and branch prediction may
CVE-2018-3693
5.6 - Medium
- July 10, 2018
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may
CVE-2018-3639
5.5 - Medium
- May 22, 2018
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Side Channel Attack
Systems with microprocessors utilizing speculative execution and
CVE-2018-3640
5.6 - Medium
- May 22, 2018
Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
Side Channel Attack
Systems with microprocessors utilizing speculative execution may
CVE-2018-9056
5.6 - Medium
- March 27, 2018
Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope.
Information Disclosure
Systems with microprocessors utilizing speculative execution and branch prediction may
CVE-2017-5753
5.6 - Medium
- January 04, 2018
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Side Channel Attack
Systems with microprocessors utilizing speculative execution and indirect branch prediction may
CVE-2017-5715
5.6 - Medium
- January 04, 2018
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Side Channel Attack
Systems with microprocessors utilizing speculative execution and indirect branch prediction may
CVE-2017-5754
5.6 - Medium
- January 04, 2018
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
Information Disclosure
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Arm Cortex A or by Intel? Click the Watch button to subscribe.
![subscribe](/images/undraw_subscriber_vabu.png)