{"id":"CVE-2018-3639","details":"Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.","modified":"2026-03-15T22:20:19.279851Z","published":"2018-05-22T12:29:00.250Z","related":["MGASA-2018-0262","MGASA-2018-0263","MGASA-2018-0264","MGASA-2018-0265","MGASA-2018-0298","MGASA-2018-0322","SUSE-SU-2018:1362-1","SUSE-SU-2018:1362-2","SUSE-SU-2018:1363-1","SUSE-SU-2018:1366-1","SUSE-SU-2018:1368-1","SUSE-SU-2018:1374-1","SUSE-SU-2018:1375-1","SUSE-SU-2018:1376-1","SUSE-SU-2018:1377-1","SUSE-SU-2018:1377-2","SUSE-SU-2018:1378-1","SUSE-SU-2018:1386-1","SUSE-SU-2018:1389-1","SUSE-SU-2018:1452-1","SUSE-SU-2018:1456-1","SUSE-SU-2018:1475-1","SUSE-SU-2018:1479-1","SUSE-SU-2018:1582-1","SUSE-SU-2018:1603-1","SUSE-SU-2018:1614-1","SUSE-SU-2018:1614-2","SUSE-SU-2018:1658-1","SUSE-SU-2018:1699-1","SUSE-SU-2018:1699-2","SUSE-SU-2018:1816-1","SUSE-SU-2018:1846-1","SUSE-SU-2018:1926-1","SUSE-SU-2018:1935-1","SUSE-SU-2018:1935-2","SUSE-SU-2018:2076-1","SUSE-SU-2018:2082-1","SUSE-SU-2018:2092-1","SUSE-SU-2018:2141-1","SUSE-SU-2018:2304-1","SUSE-SU-2018:2331-1","SUSE-SU-2018:2331-2","SUSE-SU-2018:2335-1","SUSE-SU-2018:2338-1","SUSE-SU-2018:2340-1","SUSE-SU-2018:2528-1","SUSE-SU-2018:2556-1","SUSE-SU-2018:2565-1","SUSE-SU-2018:2615-1","SUSE-SU-2018:2650-1","SUSE-SU-2018:2973-1","SUSE-SU-2018:2973-2","SUSE-SU-2018:3064-1","SUSE-SU-2018:3064-2","SUSE-SU-2018:3064-3","SUSE-SU-2018:3555-1","SUSE-SU-2019:0049-1","SUSE-SU-2019:0049-2","SUSE-SU-2019:0148-1","SUSE-SU-2019:1211-1","SUSE-SU-2019:1211-2","SUSE-SU-2019:1219-1","SUSE-SU-2019:2028-1","SUSE-SU-2020:2540-1","SUSE-SU-2020:2605-1","SUSE-SU-2021:3007-1","SUSE-SU-2021:3969-1","SUSE-SU-2023:3324-1","SUSE-SU-2023:3333-1","SUSE-SU-2023:3349-1","openSUSE-SU-2019:1438-1","openSUSE-SU-2020:1325-1","openSUSE-SU-2024:10633-1","openSUSE-SU-2024:10876-1","openSUSE-SU-2024:11008-1","openSUSE-SU-2024:11287-1","openSUSE-SU-2024:11520-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040949"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1711"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3655-2/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2172"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0148"},{"type":"ADVISORY","url":"https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3654-2/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/06/10/1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1664"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2162"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2328"},{"type":"ADVISORY","url":"https://support.citrix.com/article/CTX235225"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4210"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3401"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1737"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1738"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1637"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1660"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1688"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1689"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2258"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4273"},{"type":"ADVISORY","url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1686"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1696"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"type":"ADVISORY","url":"http://support.lenovo.com/us/en/solutions/LEN-22133"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1652"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1826"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2171"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3397"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1662"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1690"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3655-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3423"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3425"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1633"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1649"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1667"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3652-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1641"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1661"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2006"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2394"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1046"},{"type":"ADVISORY","url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/06/10/5"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1630"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1636"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1643"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2364"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3398"},{"type":"ADVISORY","url":"https://www.kb.cert.org/vuls/id/180049"},{"type":"ADVISORY","url":"https://www.us-cert.gov/ncas/alerts/TA18-141A"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1648"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2363"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3407"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1639"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3777-3/"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1657"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2060"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"},{"type":"ADVISORY","url":"https://nvidia.custhelp.com/app/answers/detail/a_id/4787"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1997"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2309"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1710"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1669"},{"type":"ADVISORY","url":"http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1635"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1659"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1666"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3680-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1632"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1646"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1654"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1674"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2396"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3400"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1668"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2216"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3399"},{"type":"ADVISORY","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1629"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1647"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1650"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3424"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1640"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1651"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1655"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1658"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2228"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"},{"type":"ADVISORY","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180521-0001/"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2003"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2161"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2250"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3396"},{"type":"ADVISORY","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3653-1/"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1638"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1642"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1644"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1663"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1967"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/104232"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1653"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1965"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3653-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3654-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2387"},{"type":"ADVISORY","url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1675"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2289"},{"type":"ADVISORY","url":"https://www.synology.com/support/security/Synology_SA_18_23"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1656"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2001"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2164"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3402"},{"type":"ADVISORY","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3679-1/"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1042004"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1676"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-263.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1645"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1665"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2246"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3651-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3756-1/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/06/10/2"},{"type":"REPORT","url":"https://seclists.org/bugtraq/2019/Jun/36"},{"type":"FIX","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"},{"type":"FIX","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/44695/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8"}]},{"events":[{"introduced":"0"},{"last_affected":"9"}]},{"events":[{"introduced":"0"},{"last_affected":"10"}]},{"events":[{"introduced":"0"},{"last_affected":"12"}]},{"events":[{"introduced":"0"},{"last_affected":"13"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.3"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"5.9"}]},{"events":[{"introduced":"0"},{"last_affected":"6.4"}]},{"events":[{"introduced":"0"},{"last_affected":"6.5"}]},{"events":[{"introduced":"0"},{"last_affected":"6.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"6.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"fixed":"3.1"}]},{"events":[{"introduced":"0"},{"fixed":"3.1"}]},{"events":[{"introduced":"0"},{"fixed":"3.1"}]},{"events":[{"introduced":"0"},{"fixed":"3.1"}]},{"events":[{"introduced":"0"},{"fixed":"3.1"}]},{"events":[{"introduced":"0"},{"fixed":"3.1"}]},{"events":[{"introduced":"13.0"},{"last_affected":"13.3"}]},{"events":[{"introduced":"0"},{"last_affected":"11"}]},{"events":[{"introduced":"0"},{"fixed":"2.6"}]},{"events":[{"introduced":"0"},{"fixed":"18.01.09"}]},{"events":[{"introduced":"0"},{"fixed":"22.01.06"}]},{"events":[{"introduced":"0"},{"fixed":"1.5"}]},{"events":[{"introduced":"0"},{"fixed":"1.5"}]},{"events":[{"introduced":"0"},{"fixed":"17.0x.14"}]},{"events":[{"introduced":"0"},{"fixed":"21.01.09"}]},{"events":[{"introduced":"0"},{"fixed":"17.0x.14"}]},{"events":[{"introduced":"0"},{"fixed":"21.01.09"}]},{"events":[{"introduced":"0"},{"fixed":"21.01.09"}]},{"events":[{"introduced":"0"},{"fixed":"r1.30.0"}]},{"events":[{"introduced":"0"},{"fixed":"r1.23.0"}]},{"events":[{"introduced":"0"},{"fixed":"15.02.15"}]},{"events":[{"introduced":"0"},{"fixed":"19.02.11"}]},{"events":[{"introduced":"0"},{"fixed":"15.01.14"}]},{"events":[{"introduced":"0"},{"fixed":"19.01.14"}]},{"events":[{"introduced":"0"},{"fixed":"19.02.11"}]},{"events":[{"introduced":"0"},{"fixed":"15.02.15"}]},{"events":[{"introduced":"0"},{"fixed":"15.02.15"}]},{"events":[{"introduced":"0"},{"fixed":"19.02.11"}]},{"events":[{"introduced":"0"},{"fixed":"15.01.14"}]},{"events":[{"introduced":"0"},{"fixed":"19.01.14"}]},{"events":[{"introduced":"0"},{"fixed":"23.01.04"}]},{"events":[{"introduced":"0"},{"fixed":"2.6"}]},{"events":[{"introduced":"0"},{"fixed":"17.0x.14"}]},{"events":[{"introduced":"0"},{"fixed":"15.02.15"}]},{"events":[{"introduced":"0"},{"fixed":"7.6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"fixed":"r28.3"}]},{"events":[{"introduced":"0"},{"fixed":"r28.3"}]},{"events":[{"introduced":"0"},{"last_affected":"1607"}]},{"events":[{"introduced":"0"},{"last_affected":"1703"}]},{"events":[{"introduced":"0"},{"last_affected":"1709"}]},{"events":[{"introduced":"0"},{"last_affected":"1803"}]},{"events":[{"introduced":"0"},{"last_affected":"1809"}]},{"events":[{"introduced":"0"},{"last_affected":"r2-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"sp2"}]},{"events":[{"introduced":"0"},{"last_affected":"r2"}]},{"events":[{"introduced":"0"},{"last_affected":"1709"}]},{"events":[{"introduced":"0"},{"last_affected":"1803"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-3639.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}