Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

mercredi 9 janvier 2019

Intel SSD Data Center Tool up to 3.0.16 on Windows Directory Permission privilege escalation

A vulnerability, which was classified as critical, has been found in Intel SSD Data Center Tool up to 3.0.16 on Windows. Affected by this issue is some functionality of the component Directory Permission. The manipulation with an unknown input leads to a privilege escalation vulnerability. Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.

The weakness was presented 01/10/2019. The advisory is shared for download at intel.com. This vulnerability is handled as CVE-2018-3703 since 12/28/2017. The attack needs to be approached locally. A single authentication is necessary for exploitation. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $5k-$25k (estimation calculated on 01/11/2019).

Upgrading to version 3.0.17 eliminates this vulnerability.

CPE

CVSSv3

VulDB Meta Base Score: 5.3
VulDB Meta Temp Score: 5.1

VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔒
VulDB Reliability: 🔍

CVSSv2

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍

Exploiting

Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No

Availability: 🔒

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligence

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Actions: 🔍

Countermeasures

Recommended: Upgrade
Status: 🔍
0-Day Time: 🔒

Upgrade: SSD Data Center Tool 3.0.17

Timeline

12/28/2017 CVE assigned
01/10/2019 Advisory disclosed
01/11/2019 VulDB entry created
01/11/2019 VulDB last update

Sources

Advisory: intel.com

CVE: CVE-2018-3703 (🔒)

Entry

Created: 01/11/2019
Complete: 🔍

Lien vers l'article source

Auteur: VulDB

Catégories: VulDBNombre de vues: 202

x

Événements SSI