ID

VAR-201803-1904


CVE

CVE-2018-8930


TITLE

plural AMD Vulnerability related to input validation in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-003353

DESCRIPTION

The AMD EPYC Server, Ryzen, Ryzen Pro, and Ryzen Mobile processor chips have insufficient enforcement of Hardware Validated Boot, aka MASTERKEY-1, MASTERKEY-2, and MASTERKEY-3. plural AMD The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AMD EPYC Server, etc. are all central processing unit (CPU) products of AMD in the United States. Attackers can exploit this vulnerability to install malicious software and disable security features

Trust: 1.71

sources: NVD: CVE-2018-8930 // JVNDB: JVNDB-2018-003353 // VULHUB: VHN-138962

AFFECTED PRODUCTS

vendor:amdmodel:epyc serverscope:eqversion: -

Trust: 1.6

vendor:amdmodel:ryzenscope:eqversion: -

Trust: 1.6

vendor:amdmodel:ryzen mobilescope:eqversion: -

Trust: 1.6

vendor:amdmodel:ryzen proscope:eqversion: -

Trust: 1.6

vendor:advanced micro devices amdmodel:epyc serverscope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:ryzen mobilescope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:ryzen proscope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:ryzenscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-003353 // CNNVD: CNNVD-201803-802 // NVD: CVE-2018-8930

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-8930
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-8930
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201803-802
value: CRITICAL

Trust: 0.6

VULHUB: VHN-138962
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-8930
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-138962
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-8930
baseSeverity: CRITICAL
baseScore: 9.0
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 6.0
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-138962 // JVNDB: JVNDB-2018-003353 // CNNVD: CNNVD-201803-802 // NVD: CVE-2018-8930

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-138962 // JVNDB: JVNDB-2018-003353 // NVD: CVE-2018-8930

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201803-802

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201803-802

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003353

PATCH

title:Initial AMD Technical Assessment of CTS Labs Researchurl:https://community.amd.com/community/amd-corporate/blog/2018/03/21/initial-amd-technical-assessment-of-cts-labs-research

Trust: 0.8

sources: JVNDB: JVNDB-2018-003353

EXTERNAL IDS

db:NVDid:CVE-2018-8930

Trust: 2.5

db:JVNDBid:JVNDB-2018-003353

Trust: 0.8

db:CNNVDid:CNNVD-201803-802

Trust: 0.6

db:VULHUBid:VHN-138962

Trust: 0.1

sources: VULHUB: VHN-138962 // JVNDB: JVNDB-2018-003353 // CNNVD: CNNVD-201803-802 // NVD: CVE-2018-8930

REFERENCES

url:https://amdflaws.com/

Trust: 1.7

url:https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/

Trust: 1.7

url:https://community.amd.com/community/amd-corporate/blog/2018/03/21/initial-amd-technical-assessment-of-cts-labs-research

Trust: 1.7

url:https://safefirmware.com/amdflaws_whitepaper.pdf

Trust: 1.7

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03841en_us

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8930

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-8930

Trust: 0.8

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03841en_us

Trust: 0.1

sources: VULHUB: VHN-138962 // JVNDB: JVNDB-2018-003353 // CNNVD: CNNVD-201803-802 // NVD: CVE-2018-8930

SOURCES

db:VULHUBid:VHN-138962
db:JVNDBid:JVNDB-2018-003353
db:CNNVDid:CNNVD-201803-802
db:NVDid:CVE-2018-8930

LAST UPDATE DATE

2024-11-23T22:48:45.483000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-138962date:2020-08-24T00:00:00
db:JVNDBid:JVNDB-2018-003353date:2018-05-22T00:00:00
db:CNNVDid:CNNVD-201803-802date:2020-10-22T00:00:00
db:NVDid:CVE-2018-8930date:2024-11-21T04:14:37.600

SOURCES RELEASE DATE

db:VULHUBid:VHN-138962date:2018-03-22T00:00:00
db:JVNDBid:JVNDB-2018-003353date:2018-05-22T00:00:00
db:CNNVDid:CNNVD-201803-802date:2018-03-23T00:00:00
db:NVDid:CVE-2018-8930date:2018-03-22T14:29:00.597