XiangShan Nanhu V2 and XiangShan Kunmighu V3 were discovered to use speculative execution and indirect branch prediction, allowing attackers to access sensitive information via side-channel analysis of the data cache.
[ { "events": [ { "introduced": "0" }, { "last_affected": "2.0" } ] }, { "events": [ { "introduced": "0" }, { "last_affected": "3.0" } ] } ]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63094.json"