Xeon E 2136 Intel Xeon E 2136

stack.watch can notify you when security vulnerabilities are reported in Intel Xeon E 2136. You can add multiple products that you use with Xeon E 2136 to create your own personal software stack watcher.

By the Year

In 2020 there have been 2 vulnerabilities in Intel Xeon E 2136 with an average score of 5.5 out of ten. Last year Xeon E 2136 had 0 security vulnerabilities published. That is, 2 more vulnerabilities have already been reported in 2020 as compared to last year.

Year Vulnerabilities Average Score
2020 2 5.55
2019 0 0.00
2018 1 4.60

It may take a day or so for new Xeon E 2136 vulnerabilities to show up. Additionally vulnerabilities may be tagged under a different product or component name.

Latest Intel Xeon E 2136 Security Vulnerabilities

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may

CVE-2020-0543 5.5 - Medium - June 15, 2020

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVE-2020-0543 can be explotited with local system access, and requires small amount of user privledges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 1.8 out of four. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Information Leak

Load value injection in some Intel(R) Processors utilizing speculative execution may

CVE-2020-0551 5.6 - Medium - March 12, 2020

Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html

CVE-2020-0551 can be explotited with local system access, and requires small amount of user privledges. This vulnerability is consided to have a high level of attack complexity. It has an exploitability score of 1.1 out of four. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Downstream Injection

Information disclosure vulnerability in storage media in systems with Intel Optane memory module with Whole Disk Encryption may

CVE-2018-3619 4.6 - Medium - July 10, 2018

Information disclosure vulnerability in storage media in systems with Intel Optane memory module with Whole Disk Encryption may allow an attacker to recover data via physical access.

CVE-2018-3619 can be explotited with physical access, and does not require authorization privledges or user interaction. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 0.9 out of four. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Information Leak