PatchSiren

PatchSiren cyber security CVE debrief

CVE-2018-12130 Intel Corporation CVE debrief

CVE-2018-12130 is a Microarchitectural Fill Buffer Data Sampling (MFBDS) issue tied to Intel speculative-execution behavior that may let an authenticated local user disclose information via a side channel. In the supplied advisory, Schneider Electric maps the risk to EcoStruxure Foxboro DCS Virtualization Server V91 and Standard Workstation H92, with later source revisions also adding H90. The recommended path is to move to newer hardware/platforms or apply BIOS and OS mitigations while following defense-in-depth guidance.

Vendor
Intel Corporation
Product
EcoStruxureâ„¢ Foxboro DCS Virtualization Server
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-12-09
Original CVE updated
2026-02-24
Advisory published
2025-12-09
Advisory updated
2026-02-24

Who should care

Schneider Electric EcoStruxure Foxboro DCS administrators, OT security teams, and support staff running affected Intel Xeon-based virtualization servers or workstations, especially systems that permit local authenticated access.

Technical summary

The advisory describes a speculative-execution side-channel weakness (MFBDS) affecting fill buffers on some Intel microprocessors. The supplied description says an authenticated user with local access may potentially enable information disclosure. The CSAF record lists a CVSS v3.0 vector of AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N (6.5 Medium), indicating a confidentiality-focused local attack with no integrity or availability impact.

Defensive priority

Medium. Prioritize remediation for affected Foxboro DCS environments because the issue can disclose sensitive data from locally accessible systems, even though it requires authenticated local access.

Recommended defensive actions

  • Upgrade to the latest Foxboro server and workstation platforms listed in the advisory: V95/H94 and Dell D96; contact Schneider Electric support for migration guidance.
  • If immediate migration is not possible, apply the BIOS and OS security patches referenced in the advisory to reduce exploitation risk.
  • Follow the Schneider Electric defense-in-depth guidance and the CISA ICS recommended practices referenced by the source advisory.
  • Review the Schneider Electric security notice and the CISA republication for product-specific remediation details, including any hardware determination guidance in later revisions.

Evidence notes

Evidence is drawn from the CISA CSAF republication of Schneider Electric advisory SEVD-2025-343-01. The source description identifies MFBDS as a speculative-execution fill-buffer issue disclosed by Intel and states it may cause information disclosure via a local side channel. The advisory names EcoStruxure Foxboro DCS Virtualization Server V91 and Standard Workstation H92 as impacted, and revision history shows H90 added later. Remediation language in the source recommends upgrading to newer hardware or applying BIOS/OS patches and defense-in-depth mitigations.

Official resources

The supplied source advisory was initially published on 2025-12-09 and last updated on 2026-02-24. It republishes Schneider Electric advisory SEVD-2025-343-01 and references Intel's INTEL-SA-00233 for the underlying microarchitectural issue