PatchSiren cyber security CVE debrief
CVE-2018-12130 Intel Corporation CVE debrief
CVE-2018-12130 is a Microarchitectural Fill Buffer Data Sampling (MFBDS) issue tied to Intel speculative-execution behavior that may let an authenticated local user disclose information via a side channel. In the supplied advisory, Schneider Electric maps the risk to EcoStruxure Foxboro DCS Virtualization Server V91 and Standard Workstation H92, with later source revisions also adding H90. The recommended path is to move to newer hardware/platforms or apply BIOS and OS mitigations while following defense-in-depth guidance.
- Vendor
- Intel Corporation
- Product
- EcoStruxureâ„¢ Foxboro DCS Virtualization Server
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-12-09
- Original CVE updated
- 2026-02-24
- Advisory published
- 2025-12-09
- Advisory updated
- 2026-02-24
Who should care
Schneider Electric EcoStruxure Foxboro DCS administrators, OT security teams, and support staff running affected Intel Xeon-based virtualization servers or workstations, especially systems that permit local authenticated access.
Technical summary
The advisory describes a speculative-execution side-channel weakness (MFBDS) affecting fill buffers on some Intel microprocessors. The supplied description says an authenticated user with local access may potentially enable information disclosure. The CSAF record lists a CVSS v3.0 vector of AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N (6.5 Medium), indicating a confidentiality-focused local attack with no integrity or availability impact.
Defensive priority
Medium. Prioritize remediation for affected Foxboro DCS environments because the issue can disclose sensitive data from locally accessible systems, even though it requires authenticated local access.
Recommended defensive actions
- Upgrade to the latest Foxboro server and workstation platforms listed in the advisory: V95/H94 and Dell D96; contact Schneider Electric support for migration guidance.
- If immediate migration is not possible, apply the BIOS and OS security patches referenced in the advisory to reduce exploitation risk.
- Follow the Schneider Electric defense-in-depth guidance and the CISA ICS recommended practices referenced by the source advisory.
- Review the Schneider Electric security notice and the CISA republication for product-specific remediation details, including any hardware determination guidance in later revisions.
Evidence notes
Evidence is drawn from the CISA CSAF republication of Schneider Electric advisory SEVD-2025-343-01. The source description identifies MFBDS as a speculative-execution fill-buffer issue disclosed by Intel and states it may cause information disclosure via a local side channel. The advisory names EcoStruxure Foxboro DCS Virtualization Server V91 and Standard Workstation H92 as impacted, and revision history shows H90 added later. Remediation language in the source recommends upgrading to newer hardware or applying BIOS/OS patches and defense-in-depth mitigations.
Official resources
-
CVE-2018-12130 CVE record
CVE.org
-
CVE-2018-12130 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
The supplied source advisory was initially published on 2025-12-09 and last updated on 2026-02-24. It republishes Schneider Electric advisory SEVD-2025-343-01 and references Intel's INTEL-SA-00233 for the underlying microarchitectural issue