National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2018-3652 Detail

Current Description

Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces.

Source:  MITRE
Description Last Modified:  07/10/2018
View Analysis Description

Impact

CVSS v3.0 Severity and Metrics:

Base Score: 7.6 HIGH
Vector: AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H (V3 legend)
Impact Score: 6.0
Exploitability Score: 0.9


Attack Vector (AV): Physical
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope (S): Changed
Confidentiality (C): High
Integrity (I): High
Availability (A): High

CVSS v2.0 Severity and Metrics:

Base Score: 4.6 MEDIUM
Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P) (V2 legend)
Impact Subscore: 6.4
Exploitability Subscore: 3.9


Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (AU): None
Confidentiality (C): Partial
Integrity (I): Partial
Availability (A): Partial
Additional Information:
Allows unauthorized disclosure of information
Allows unauthorized modification
Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://security.netapp.com/advisory/ntap-20180802-0001/ Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00127.html Mitigation Vendor Advisory

Technical Details

Vulnerability Type (View All)

  • Permissions, Privileges, and Access Control (CWE-264)

Vulnerable software and versions Switch to CPE 2.3

Configuration 1
OR
cpe:/h:intel:xeon_e3:1220_v5
cpe:/h:intel:xeon_e3:1220_v6
cpe:/h:intel:xeon_e3:1225_v5
cpe:/h:intel:xeon_e3:1225_v6
cpe:/h:intel:xeon_e3:1230_v5
cpe:/h:intel:xeon_e3:1230_v6
cpe:/h:intel:xeon_e3:1235l_v5
cpe:/h:intel:xeon_e3:1240_v5
cpe:/h:intel:xeon_e3:1240_v6
cpe:/h:intel:xeon_e3:1240l_v5
cpe:/h:intel:xeon_e3:1245_v5
cpe:/h:intel:xeon_e3:1245_v6
cpe:/h:intel:xeon_e3:1260l_v5
cpe:/h:intel:xeon_e3:1268l_v5
cpe:/h:intel:xeon_e3:1270_v5
cpe:/h:intel:xeon_e3:1270_v6
cpe:/h:intel:xeon_e3:1275_v5
cpe:/h:intel:xeon_e3:1275_v6
cpe:/h:intel:xeon_e3:1280_v5
cpe:/h:intel:xeon_e3:1280_v6
cpe:/h:intel:xeon_e3:1285_v6
cpe:/h:intel:xeon_e3:1501l_v6
cpe:/h:intel:xeon_e3:1501m_v6
cpe:/h:intel:xeon_e3:1505l_v5
cpe:/h:intel:xeon_e3:1505l_v6
cpe:/h:intel:xeon_e3:1505m_v5
cpe:/h:intel:xeon_e3:1505m_v6
cpe:/h:intel:xeon_e3:1515m_v5
cpe:/h:intel:xeon_e3:1535m_v5
cpe:/h:intel:xeon_e3:1535m_v6
cpe:/h:intel:xeon_e3:1545m_v5
cpe:/h:intel:xeon_e3:1558l_v5
cpe:/h:intel:xeon_e3:1565l_v5
cpe:/h:intel:xeon_e3:1575m_v5
cpe:/h:intel:xeon_e3:1578l_v5
cpe:/h:intel:xeon_e3:1585_v5
cpe:/h:intel:xeon_e3:1585l_v5
Configuration 2
OR
cpe:/h:intel:xeon_bronze:3104
cpe:/h:intel:xeon_bronze:3106
cpe:/h:intel:xeon_gold:5115
cpe:/h:intel:xeon_gold:5118
cpe:/h:intel:xeon_gold:5119t
cpe:/h:intel:xeon_gold:5120
cpe:/h:intel:xeon_gold:5120t
cpe:/h:intel:xeon_gold:5122
cpe:/h:intel:xeon_gold:6126
cpe:/h:intel:xeon_gold:6126f
cpe:/h:intel:xeon_gold:6126t
cpe:/h:intel:xeon_gold:6128
cpe:/h:intel:xeon_gold:6130
cpe:/h:intel:xeon_gold:6130f
cpe:/h:intel:xeon_gold:6130t
cpe:/h:intel:xeon_gold:6132
cpe:/h:intel:xeon_gold:6134
cpe:/h:intel:xeon_gold:6134m
cpe:/h:intel:xeon_gold:6136
cpe:/h:intel:xeon_gold:6138
cpe:/h:intel:xeon_gold:6138f
cpe:/h:intel:xeon_gold:6138p
cpe:/h:intel:xeon_gold:6138t
cpe:/h:intel:xeon_gold:6140
cpe:/h:intel:xeon_gold:6140m
cpe:/h:intel:xeon_gold:6142
cpe:/h:intel:xeon_gold:6142f
cpe:/h:intel:xeon_gold:6142m
cpe:/h:intel:xeon_gold:6144
cpe:/h:intel:xeon_gold:6146
cpe:/h:intel:xeon_gold:6148
cpe:/h:intel:xeon_gold:6148f
cpe:/h:intel:xeon_gold:6150
cpe:/h:intel:xeon_gold:6152
cpe:/h:intel:xeon_gold:6154
cpe:/h:intel:xeon_platinum:8153
cpe:/h:intel:xeon_platinum:8156
cpe:/h:intel:xeon_platinum:8158
cpe:/h:intel:xeon_platinum:8160
cpe:/h:intel:xeon_platinum:8160f
cpe:/h:intel:xeon_platinum:8160m
cpe:/h:intel:xeon_platinum:8160t
cpe:/h:intel:xeon_platinum:8164
cpe:/h:intel:xeon_platinum:8168
cpe:/h:intel:xeon_platinum:8170
cpe:/h:intel:xeon_platinum:8170m
cpe:/h:intel:xeon_platinum:8176
cpe:/h:intel:xeon_platinum:8176f
cpe:/h:intel:xeon_platinum:8176m
cpe:/h:intel:xeon_platinum:8180
cpe:/h:intel:xeon_platinum:8180m
cpe:/h:intel:xeon_silver:4108
cpe:/h:intel:xeon_silver:4109t
cpe:/h:intel:xeon_silver:4110
cpe:/h:intel:xeon_silver:4112
cpe:/h:intel:xeon_silver:4114
cpe:/h:intel:xeon_silver:4114t
cpe:/h:intel:xeon_silver:4116
cpe:/h:intel:xeon_silver:4116t
Configuration 3
OR
cpe:/h:intel:xeon:d-1513n
cpe:/h:intel:xeon:d-1518
cpe:/h:intel:xeon:d-1520
cpe:/h:intel:xeon:d-1521
cpe:/h:intel:xeon:d-1523n
Configuration 4
Showing 100 of 164 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2018-3652
NVD Published Date:
07/10/2018
NVD Last Modified:
09/11/2018