Lucene search

K
hpHP, HP Product Security Response Team (PSRT)HP:C06001626
HistoryMay 04, 2018 - 12:00 a.m.

HPSBHF03584 rev. 8 - Derivative Side-Channel Analysis Method

2018-05-0400:00:00
HP, HP Product Security Response Team (PSRT)
support.hp.com
16

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

Potential Security Impact

Unauthorized exposure of privileged data from memory.

Source: HP, HP Product Security Response Team (PSRT)

Reported By:

CVE-2018-3639: Google Project Zero (GPZ) Microsoft Security Response Center (MSRC)

CVE-2018-3640: Researchers from SYSGO AG and BiZone LLC

VULNERABILITY SUMMARY

Derivatives of speculative execution side-channel analysis methods publicly disclosed in January 2018 can be exploited to facilitate the unauthorized exposure of privileged data from memory.

More information is available at the following links:

RESOLUTION

HP is working with processor vendors for mitigation of this issue. This bulletin will be updated; check back frequently for updates to this section and other sections. HP is identifying affected platforms and target dates for Softpaqs. See the current list below.

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N