Lucene search

K
cve[email protected]CVE-2018-3652
HistoryJul 10, 2018 - 9:29 p.m.

CVE-2018-3652

2018-07-1021:29:00
CWE-200
web.nvd.nist.gov
27
cve-2018-3652
uefi
intel xeon
processor
dci
debug interface
platform secrets

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.6 High

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.5%

Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces.

Affected configurations

NVD
Node
intelxeon_e3Match1505m_v6
OR
intelxeon_e3Match1515m_v5
OR
intelxeon_e3Match1535m_v5
OR
intelxeon_e3Match1535m_v6
OR
intelxeon_e3Match1545m_v5
OR
intelxeon_e3Match1558l_v5
OR
intelxeon_e3Match1565l_v5
OR
intelxeon_e3Match1575m_v5
OR
intelxeon_e3Match1578l_v5
OR
intelxeon_e3Match1585_v5
OR
intelxeon_e3Match1585l_v5
OR
intelxeon_e3_1220_v5Match-
OR
intelxeon_e3_1220_v6Match-
OR
intelxeon_e3_1225_v5Match-
OR
intelxeon_e3_1225_v6Match-
OR
intelxeon_e3_1230_v5Match-
OR
intelxeon_e3_1230_v6Match-
OR
intelxeon_e3_1235l_v5Match-
OR
intelxeon_e3_1240_v5Match-
OR
intelxeon_e3_1240_v6Match-
OR
intelxeon_e3_1240l_v5Match-
OR
intelxeon_e3_1245_v5Match-
OR
intelxeon_e3_1245_v6Match-
OR
intelxeon_e3_1260l_v5Match-
OR
intelxeon_e3_1268l_v5Match-
OR
intelxeon_e3_1270_v5Match-
OR
intelxeon_e3_1270_v6Match-
OR
intelxeon_e3_1275_v5Match-
OR
intelxeon_e3_1275_v6Match-
OR
intelxeon_e3_1280_v5Match-
OR
intelxeon_e3_1280_v6Match-
OR
intelxeon_e3_1285_v6Match-
OR
intelxeon_e3_1501l_v6Match-
OR
intelxeon_e3_1501m_v6Match-
OR
intelxeon_e3_1505l_v5Match-
OR
intelxeon_e3_1505l_v6Match-
OR
intelxeon_e3_1505m_v5Match-
Node
intelxeon_bronze_3104Match-
OR
intelxeon_bronze_3106Match-
OR
intelxeon_goldMatch5115
OR
intelxeon_goldMatch5118
OR
intelxeon_goldMatch5119t
OR
intelxeon_goldMatch5120
OR
intelxeon_goldMatch5120t
OR
intelxeon_goldMatch5122
OR
intelxeon_goldMatch6126
OR
intelxeon_goldMatch6126f
OR
intelxeon_goldMatch6126t
OR
intelxeon_goldMatch6128
OR
intelxeon_goldMatch6130
OR
intelxeon_goldMatch6130f
OR
intelxeon_goldMatch6130t
OR
intelxeon_goldMatch6132
OR
intelxeon_goldMatch6134
OR
intelxeon_goldMatch6134m
OR
intelxeon_goldMatch6136
OR
intelxeon_goldMatch6138
OR
intelxeon_goldMatch6138f
OR
intelxeon_goldMatch6138p
OR
intelxeon_goldMatch6138t
OR
intelxeon_goldMatch6140
OR
intelxeon_goldMatch6140m
OR
intelxeon_goldMatch6142
OR
intelxeon_goldMatch6142f
OR
intelxeon_goldMatch6142m
OR
intelxeon_goldMatch6144
OR
intelxeon_goldMatch6146
OR
intelxeon_goldMatch6148
OR
intelxeon_goldMatch6148f
OR
intelxeon_goldMatch6150
OR
intelxeon_goldMatch6152
OR
intelxeon_goldMatch6154
OR
intelxeon_platinumMatch8153
OR
intelxeon_platinumMatch8156
OR
intelxeon_platinumMatch8158
OR
intelxeon_platinumMatch8160
OR
intelxeon_platinumMatch8160f
OR
intelxeon_platinumMatch8160m
OR
intelxeon_platinumMatch8160t
OR
intelxeon_platinumMatch8164
OR
intelxeon_platinumMatch8168
OR
intelxeon_platinumMatch8170
OR
intelxeon_platinumMatch8170m
OR
intelxeon_platinumMatch8176
OR
intelxeon_platinumMatch8176f
OR
intelxeon_platinumMatch8176m
OR
intelxeon_platinumMatch8180
OR
intelxeon_platinumMatch8180m
OR
intelxeon_silverMatch4108
OR
intelxeon_silverMatch4109t
OR
intelxeon_silverMatch4110
OR
intelxeon_silverMatch4112
OR
intelxeon_silverMatch4114
OR
intelxeon_silverMatch4114t
OR
intelxeon_silverMatch4116
OR
intelxeon_silverMatch4116t
Node
intelxeonMatchd-1513n
OR
intelxeonMatchd-1518
OR
intelxeonMatchd-1520
OR
intelxeonMatchd-1521
OR
intelxeonMatchd-1523n
OR
intelxeonMatchd-1527
OR
intelxeonMatchd-1528
OR
intelxeonMatchd-1529
OR
intelxeonMatchd-1531
OR
intelxeonMatchd-1533n
OR
intelxeonMatchd-1537
OR
intelxeonMatchd-1539
OR
intelxeonMatchd-1540
OR
intelxeonMatchd-1541
OR
intelxeonMatchd-1543n
OR
intelxeonMatchd-1548
OR
intelxeonMatchd-1553n
OR
intelxeonMatchd-1557
OR
intelxeonMatchd-1559
OR
intelxeonMatchd-1567
OR
intelxeonMatchd-1571
OR
intelxeonMatchd-1577
OR
intelxeonMatchd-2123it
OR
intelxeonMatchd-2141i
OR
intelxeonMatchd-2142it
OR
intelxeonMatchd-2143it
OR
intelxeonMatchd-2145nt
OR
intelxeonMatchd-2146nt
OR
intelxeonMatchd-2161i
OR
intelxeonMatchd-2163it
OR
intelxeonMatchd-2166nt
OR
intelxeonMatchd-2173it
OR
intelxeonMatchd-2177nt
OR
intelxeonMatchd-2183it
OR
intelxeonMatchd-2187nt
Node
intelatom_cMatchc2308
OR
intelatom_cMatchc2316
OR
intelatom_cMatchc2338
OR
intelatom_cMatchc2350
OR
intelatom_cMatchc2358
OR
intelatom_cMatchc2508
OR
intelatom_cMatchc2516
OR
intelatom_cMatchc2518
OR
intelatom_cMatchc2530
OR
intelatom_cMatchc2538
OR
intelatom_cMatchc2550
OR
intelatom_cMatchc2558
OR
intelatom_cMatchc2718
OR
intelatom_cMatchc2730
OR
intelatom_cMatchc2738
OR
intelatom_cMatchc2750
OR
intelatom_cMatchc2758
OR
intelatom_cMatchc3308
OR
intelatom_cMatchc3336
OR
intelatom_cMatchc3338
OR
intelatom_cMatchc3508
OR
intelatom_cMatchc3538
OR
intelatom_cMatchc3558
OR
intelatom_cMatchc3708
OR
intelatom_cMatchc3750
OR
intelatom_cMatchc3758
OR
intelatom_cMatchc3808
OR
intelatom_cMatchc3830
OR
intelatom_cMatchc3850
OR
intelatom_cMatchc3858
OR
intelatom_cMatchc3950
OR
intelatom_cMatchc3955
OR
intelatom_cMatchc3958

CNA Affected

[
  {
    "product": "Intel Xeon Processor",
    "vendor": "Intel Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family"
      }
    ]
  }
]

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.6 High

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.5%

Related for CVE-2018-3652