On June 9, 2020, Intel publicly disclosed a potential security vulnerability in some Intel® Processors that may allow information disclosure. Intel has coordinated with industry partners to release microcode updates that address these vulnerabilities.
Special Register Buffer Data Sampling (SRBDS) is similar to previously disclosed transient execution vulnerabilities (MDS, TAA) and independently reported by external researchers, who refer to the issue as CrossTalk.
This vulnerability affects some client and Intel Xeon E3 processors. It does not affect other Intel Xeon Scalable or Intel Atom® processors, or the recently released 10th Gen Core due to different microarchitecture.
Due to its complexity, SRBDS has been classified as medium severity per the industry standard CVSS, and it’s important to note that there are no reports of any real-world exploits of these vulnerabilities.
Affected Products: View a list of impacted products.
Recommendations: Intel recommends that users of the affected Intel® Processors contact their system manufacturer/provider in order to confirm their system’s current firmware version and determine if an update is needed to address these vulnerabilities.
If further assistance is needed, please contact Intel Customer Support.