Lucene search

K
ibmIBM796C7BD66203703C25293085A64D664CE24B1331ED4007E91E708A8FF31868AB
HistoryDec 07, 2023 - 10:31 p.m.

Security Bulletin: IBM has released Unified Extensible Firmware Interface (UEFI) fixes in response to Spectre variants 4 and 3a (CVE-2018-3639 CVE-2018-3640)

2023-12-0722:31:00
www.ibm.com
39
ibm
uefi
fixes
spectre
variants
4
3a
bladecenter
flex
system x
firmware
vulnerability
cve-2018-3639
cve-2018-3640
l1 terminal fault

6.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N

5.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:P/A:N

0.003 Low

EPSS

Percentile

65.2%

Summary

IBM has released the following Unified Extensible Firmware Interface (UEFI) fixes for System x, Flex and BladeCenter systems in response to the vulnerabilities referred to as Spectre variants 4 and 3a.

Vulnerability Details

CVEID: CVE-2018-3639 DESCRIPTION: Multiple Intel CPU’'s could allow a local attacker to obtain sensitive information, caused by utilizing sequences of speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known. By conducting targeted cache side-channel attacks, an attacker could exploit this vulnerability to bypass security restrictions and gain read access to privileged memory. Note: This vulnerability is the Speculative Store Bypass (SSB), also known as Variant 4 or “SpectreNG”.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/143569&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)

CVEID: CVE-2018-3640 DESCRIPTION: Multiple Intel CPU’'s could allow a local attacker to obtain sensitive information, caused by utilizing sequences of speculative execution that perform speculative reads of system registers. By conducting targeted cache side-channel attacks, an attacker could exploit this vulnerability to determine the values stored in system registers. Note: This vulnerability is the Rogue System Register Read (RSRE), also known as Variant 3a.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/143570&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)

Affected Products and Versions

Product

|

Affected Version

—|—

BladeCenter HS22 1911/1936/7809/7870
BladeCenter HS22V 1949/7871

|

p9e1

BladeCenter HS23 7875/1929

|

tke1

BladeCenter HS23E 8038/8039

|

ahe1

Flex System x220 2585/7906

|

kse1

Flex System x222 7916

|

cce1

Flex System x240 7863/8737/8738/8956

|

b2e1

Flex System x280, x480, x880 7903

|

n2e1

Flex System x440 7917

|

cne1

System x iDataPlex dx360 M2
System x iDataPlex dx360 M3

|

tme1

System x iDataPlex dx360 M4 7912/7913

|

tde1

System x NeXtScale nx360 M4 5455

|

fhe1

System x3200 M3 7327/7328
System x3250 M3 4251/4252/4261

|

gye1

System x3400 M2 7836/7837
System x3400 M3 7378/7379
System x3500 M2 7839
System x3500 M3 7380

|

y4e1

System x3550 M2 4198/7946
System x3550 M3 4254/7944
System x3650 M2 4199/7947
System x3650 M3 4255/7945

|

d6e1

System x3620 M3 7376
System x3630 M3 7377

|

hse1

System x3100 M4 2582
System x3250 M4 2583

|

jqe1

System x3100 M5 5457

|

j9e1

System x3250 M5 5458

|

jue1

System x3300 M4 7382

|

yae1

System x3500 M4 7383

|

y5e1

System x3550 M4 7914

|

d7e1

System x3630 M4 7158
System x3530 M4 7160

|

bee1

System x3650 M4 7915
System x3650 M4 HD 5460

|

vve1

System x3650 M4 BD 5466

|

yoe1

System x3750 M4 8718/8722/8733/8752

|

koe1

System x3850 x6 3837/3839
System x3950 x6 3839

|

a8e1

BladeCenter HX5 7872/1909/1910/7873

|

hie1

System x3850 x5 7145/7146
System x3950 x5 7143/7191

|

g0e1

System x3690 x5 7147/7148/7149/7192

|

mle1

Remediation/Fixes

Firmware fix versions are available on Fix Central: http://www.ibm.com/support/fixcentral/

UEFI fix versions listed below also include the remediation for L1 Terminal Fault CVEs CVE-2018-3615, CVE-2018-3620 and CVE-2018-3646.

Product

|

Fix Version

—|—

BladeCenter HS22 1911/1936/7809/7870
BladeCenter HS22V 1949/7871
(ibm_fw_uefi_p9e165b-1.29_linux_32-64
ibm_fw_uefi_p9e165b-1.29_windows_32-64)

|

p9e165b-1.29

BladeCenter HS23 7875/1929
(ibm_fw_uefi_tke160c-2.40_anyos_32-64)

|

tke160c-2.40

BladeCenter HS23E 8038/8039
(ibm_fw_uefi_ahe160c-2.80_anyos_32-64)

|

ahe160c-2.80

Flex System x220 2585/7906
(ibm_fw_uefi_kse158c-2.20_anyos_32-64)

|

kse158c-2.20

Flex System x222 7916
(ibm_fw_uefi_cce160c-2.00_anyos_32-64)

|

cce160c-2.00

Flex System x240 7863/8737/8738/8956
(ibm_fw_uefi_b2e162c-2.20_anyos_32-64)

|

b2e162c-2.20

Flex System x280, x480, x880 7903
(ibm_fw_uefi_n2e130e-1.90_anyos_32-64)

|

n2e130e-1.90

Flex System x440 7917
(ibm_fw_uefi_cne162d-2.10_anyos_32-64)

|

cne162d-2.10

System x iDataPlex dx360 M2
System x iDataPlex dx360 M3
(ibm_fw_uefi_tme163a-1.43_linux_32-64
ibm_fw_uefi_tme163a-1.43_windows_32-64)

|

tme163a-1.43

System x iDataPlex dx360 M4 7912/7913
(ibm_fw_uefi_tde156c-2.10_anyos_32-64)

|

tde156c-2.10

System x NeXtScale nx360 M4 5455
(ibm_fw_uefi_fhe120d-1.90_anyos_32-64)

|

fhe120d-1.90

System x3200 M3 7327/7328
System x3250 M3 4251/4252/4261
(ibm_fw_uefi_gye165a-1.30_linux_32-64
ibm_fw_uefi_gye165a-1.30_windows_32-64)

|

gye165a-1.30

System x3400 M2 7836/7837
System x3400 M3 7378/7379
System x3500 M2 7839
System x3500 M3 7380
(ibm_fw_uefi_y4e161a-1.17_linux_32-64
ibm_fw_uefi_y4e161a-1.17_windows_32-64)

|

y4e161a-1.17

System x3550 M2 4198/7946
System x3550 M3 4254/7944
System x3650 M2 4199/7947
System x3650 M3 4255/7945
(ibm_fw_uefi_d6e164a-1.22_linux_32-64
ibm_fw_uefi_d6e164a-1.22_windows_32-64)

|

d6e164a-1.22

System x3620 M3 7376
System x3630 M3 7377
(ibm_fw_uefi_hse127a-1.16_linux_32-64
ibm_fw_uefi_hse127a-1.16_windows_32-64)

|

hse127a-1.16

System x3100 M4 2582
System x3250 M4 2583
(ibm_fw_uefi_jqe184c-1.90_anyos_32-64)

|

jqe184cs-1.90

System x3100 M5 5457
(ibm_fw_uefi_j9e134c-1.80_anyos_32-64)

|

j9e134c-1.80

System x3250 M5 5458
(ibm_fw_uefi_jue134c-1.80_anyos_32-64)

|

jue134c-1.80

System x3300 M4 7382
(ibm_fw_uefi_yae156c-2.10_anyos_32-64)

|

yae156C - 2.10

System x3500 M4 7383
(ibm_fw_uefi_y5e158c-2.60_anyos_32-64)

|

y5e158c-2.60

System x3550 M4 7914
(ibm_fw_uefi_d7e164c-2.70_anyos_32-64)

|

d7e164c-2.70

System x3630 M4 7158
System x3530 M4 7160
(ibm_fw_uefi_bee164c-3.00_anyos_32-64)

|

bee164c-3.00

System x3650 M4 7915
System x3650 M4 HD 5460
(ibm_fw_uefi_vve160c-2.70_anyos_32-64)

|

vve160c-2.70

System x3650 M4 BD 5466
(ibm_fw_uefi_yoe126c-2.20_anyos_32-64)

|

yoe126c-2.20

System x3750 M4 8718/8722/8733/8752
(ibm_fw_uefi_koe160c-2.20_anyos_32-64)

|

koe160c-2.20

System x3850 x6 3837/3839
System x3950 x6 3839
(ibm_fw_uefi_a8e128c-1.70_anyos_32-64)

|

a8e128c-1.70

BladeCenter HX5 7872/1909/1910/7873
(ibm_fw_uefi_hie188b-1.88_linux_32-64.tml
ibm_fw_uefi_hie188b-1.88_windows_32-64)

|

hie188b-1.88

System x3850 x5 7145/7146
System x3950 x5 7143/7191
(ibm_fw_uefi_g0e188b-1.88_linux_32-64
ibm_fw_uefi_g0e188b-1.88_windows_32-64)

|

g0e188b-1.88

System x3690 x5 7147/7148/7149/7192
(ibm_fw_uefi_mle188b-1.88_linux_32-64 ibm_fw_uefi_mle188b-1.88_windows_32-64)

|

mle188b-1.88

Workarounds and Mitigations

None

6.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N

5.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:P/A:N

0.003 Low

EPSS

Percentile

65.2%