7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
18.5%
TCG Trusted Platform Module code is used by PowerVM to support virtual TPM. This bulletin provides a remediation for the impacted vulnerabilities, CVE-2023-1017 and CVE-2023-1018, by upgrading PowerVM and thus addressing the exposure to the TCG TPM vulnerability.
CVEID:CVE-2023-1017
**DESCRIPTION:**Trusted Computing Group Trusted Platform Module could allow a local authenticated attacker to execute arbitrary code on the system, caused by an out-of-bounds write flaw in the CryptParameterDecryption routine. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the TPM context or crash the TPM chip/process or rendering it unusable.
CVSS Base score: 7.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/248634 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVEID:CVE-2023-1018
**DESCRIPTION:**Trusted Computing Group Trusted Platform Module could allow a local authenticated attacker to obtain sensitive information, caused by an out-of-bounds read in the CryptParameterDecryption routine. By sending a specially crafted request, an attacker could exploit this vulnerability to read or access sensitive data stored in the TPM.
CVSS Base score: 5.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/248636 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
PowerVM Hypervisor | FW1030.00 - FW1030.11 |
PowerVM Hypervisor | FW1020.00 - FW1020.31 |
PowerVM Hypervisor | FW1010.00 - FW1010.51 |
Customers with the products below should install FW1010.60(1010_166), FW1030.20(1030_058) or newer to remediate this vulnerability.
Power 10
Customers with the products below should install FW1020.40(1020_106), FW1030.20(1030_060) or newer to remediate this vulnerability.
Power 10
IBM Power System S1022 (9105-22A)
IBM Power System S1024 (9105-42A)
IBM Power System S1022s (9105-22B)
IBM Power System S1014 (9105-41B)
IBM Power System L1022 (9786-22H)
IBM Power System L1024 (9786-42H)
IBM Power System E1050 (9043-MRX)
None
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
18.5%