Microarchitectural Data Sampling
Logo designed for the vulnerabilities, featuring a wounded hand holding a broken microprocessor | |
| CVE identifier(s) | CVE-2018-12126 (Fallout), CVE-2018-12127 (RIDL), CVE-2019-11091 (RIDL, ZombieLoad), CVE-2018-12130 (RIDL, ZombieLoad), CVE-2019-11135 (ZombieLoad v2) |
|---|---|
| Date discovered | 2018 |
| Date patched | 14 May 2019 |
| Discoverer | University of Adelaide Graz University of Technology Catholic University of Leuven Qihoo 360 Cyberus Technology Saarland University Vrije Universiteit Amsterdam Bitdefender Oracle Corporation University of Michigan Worcester Polytechnic Institute |
| Affected hardware | Pre-April 2019 Intel x86 microprocessors |
| Website | mdsattacks.com ZombieLoadAttack.com |
The Microarchitectural Data Sampling (MDS) vulnerabilities are a set of weaknesses in Intel x86 microprocessors that use hyper-threading, and leak data across protection boundaries that are architecturally supposed to be secure. The attacks exploiting the vulnerabilities have been labeled Fallout, RIDL (Rogue In-Flight Data Load), ZombieLoad., and ZombieLoad 2.