7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0004 Low
EPSS
Percentile
12.6%
NVIDIA SHIELD TV vulnerabilities may lead to code execution, denial of service, escalation of privileges, or information disclosure Go to NVIDIA Product Security.
This section summarizes the potential vulnerabilities. Descriptions use CWEβ’ and risk assessments follow the CVSS V3 standard.
NVIDIA Tegra TrustZone kernel contains a potential vulnerability which could enable a local malicious application to execute arbitrary code within the context of a privileged process.
CVSS V3 Base Score: 7.8 CVSS V3 Vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVIDIA TLK TrustZone OS contains a potential vulnerability in the logging driver where the software writes data after the end or before the beginning of the intended buffer, which may lead to arbitrary code execution, denial of service, or escalation of privileges.
CVSS V3 Base Score: 8.1 CVSS V3 Vector: AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
NVIDIA TLK TrustZone OS contains a potential vulnerability in the TA-to-TA communication handler where the software performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value, which may lead to code execution or denial of service.
CVSS V3 Base Score: 5.7 CVSS V3 Vector: AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
SHIELD TV includes the latest AndroidTM security updates, and has applied patches up to the Android Security Patch level 2018-05-05. For more information about what is included in Android security patch levels, refer to the Android Security Bulletins.
NVIDIAβs risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesnβt know of any exploits to these issues at this time.
The following table lists supported software and their affected versions. All SHIELD TV versions prior to the versions listed in the Affected Versions column are also impacted by the issues in this bulletin.
List of CVEs | Software Product | Operating System | Affected Versions |
---|---|---|---|
CVE-2017-6290 CVE-2017-6292 CVE-2017-6294 | SHIELD TV | Android | SHIELD Experience 6.3 and earlier |
The following table lists the software version containing security updates for the issues described in this bulletin. If you are using an unsupported software version or an earlier SHIELD TV version that is no longer supported, upgrade to the updated supported version listed.
Support may have expired for certain NVIDIA SHIELD TV products. Contact NVIDIA Support with any questions.
Updates for SHIELD TV are available from Settings>About>System update.
SHIELD TV Product Series | Android Security Patch Level | Operating System | Updated Version |
---|---|---|---|
All | 2018-05-05 | Android | SHIELD Experience Upgrade 7.0 |
None.
None.
7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0004 Low
EPSS
Percentile
12.6%