Microarchitectural Data Sampling
| Logo designed for the vulnerabilities, featuring a wounded hand holding a broken microprocessor | |
| CVE identifier(s) | CVE-2018-12126 (Fallout), CVE-2018-12127 (RIDL), CVE-2019-11091 (RIDL, ZombieLoad), CVE-2018-12130 (RIDL, ZombieLoad), CVE-2019-11135 (ZombieLoad v2) | 
|---|---|
| Date discovered | 2018 | 
| Date patched | 14 May 2019 | 
| Discoverer | University of Adelaide Graz University of Technology Catholic University of Leuven Qihoo 360 Cyberus Technology Saarland University Vrije Universiteit Amsterdam Bitdefender Oracle Corporation University of Michigan Worcester Polytechnic Institute | 
| Affected hardware | Pre-April 2019 Intel x86 microprocessors | 
| Website | mdsattacks.com ZombieLoadAttack.com | 
The Microarchitectural Data Sampling (MDS) vulnerabilities are a set of weaknesses in Intel x86 microprocessors that use hyper-threading, and leak data across protection boundaries that are architecturally supposed to be secure. The attacks exploiting the vulnerabilities have been labeled Fallout, RIDL (Rogue In-Flight Data Load), ZombieLoad., and ZombieLoad 2.