### [CVE-2018-3640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640) ![](https://img.shields.io/static/v1?label=Product&message=Multiple&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) ### Description Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a. ### POC #### Reference - https://www.kb.cert.org/vuls/id/180049 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Lee-1109/SpeculativeAttackPoC - https://github.com/amstelchen/smc_gui - https://github.com/codexlynx/hardware-attacks-state-of-the-art - https://github.com/danswinus/HWFW - https://github.com/edsonjt81/spectre-meltdown - https://github.com/es0j/hyperbleed - https://github.com/fengjixuchui/CPU-vulnerabiility-collections - https://github.com/github-3rr0r/TEApot - https://github.com/houjingyi233/CPU-vulnerability-collections - https://github.com/interlunar/win10-regtweak - https://github.com/kali973/spectre-meltdown-checker - https://github.com/kin-cho/my-spectre-meltdown-checker - https://github.com/merlinepedra/spectre-meltdown-checker - https://github.com/merlinepedra25/spectre-meltdown-checker - https://github.com/mjaggi-cavium/spectre-meltdown-checker - https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance - https://github.com/rosenbergj/cpu-report - https://github.com/speed47/spectre-meltdown-checker - https://github.com/timidri/puppet-meltdown - https://github.com/v-lavrentikov/meltdown-spectre - https://github.com/vurtne/specter---meltdown--checker