ID

VAR-201803-1910


CVE

CVE-2018-8936


TITLE

plural AMD Vulnerabilities related to authorization, authority, and access control in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-003359

DESCRIPTION

The AMD EPYC Server, Ryzen, Ryzen Pro, and Ryzen Mobile processor chips allow Platform Security Processor (PSP) privilege escalation. plural AMD The product contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AMD EPYC Server, etc. are all central processing unit (CPU) products of AMD in the United States. Security flaws exist in several AMD products. An attacker could exploit this vulnerability to elevate privileges. The following products are affected: AMD EPYC Server; Ryzen; Ryzen Pro; Ryzen Mobile

Trust: 1.71

sources: NVD: CVE-2018-8936 // JVNDB: JVNDB-2018-003359 // VULHUB: VHN-138968

AFFECTED PRODUCTS

vendor:amdmodel:epyc serverscope:eqversion: -

Trust: 1.6

vendor:amdmodel:ryzen proscope:eqversion: -

Trust: 1.6

vendor:amdmodel:ryzenscope:eqversion: -

Trust: 1.6

vendor:amdmodel:ryzen mobilescope:eqversion: -

Trust: 1.6

vendor:advanced micro devices amdmodel:epyc serverscope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:ryzen mobilescope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:ryzen proscope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:ryzenscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-003359 // CNNVD: CNNVD-201803-796 // NVD: CVE-2018-8936

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-8936
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-8936
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201803-796
value: CRITICAL

Trust: 0.6

VULHUB: VHN-138968
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-8936
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-138968
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-8936
baseSeverity: CRITICAL
baseScore: 9.0
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 6.0
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-138968 // JVNDB: JVNDB-2018-003359 // CNNVD: CNNVD-201803-796 // NVD: CVE-2018-8936

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-138968 // JVNDB: JVNDB-2018-003359 // NVD: CVE-2018-8936

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201803-796

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201803-796

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003359

PATCH

title:Initial AMD Technical Assessment of CTS Labs Researchurl:https://community.amd.com/community/amd-corporate/blog/2018/03/21/initial-amd-technical-assessment-of-cts-labs-research

Trust: 0.8

sources: JVNDB: JVNDB-2018-003359

EXTERNAL IDS

db:NVDid:CVE-2018-8936

Trust: 2.5

db:JVNDBid:JVNDB-2018-003359

Trust: 0.8

db:CNNVDid:CNNVD-201803-796

Trust: 0.7

db:VULHUBid:VHN-138968

Trust: 0.1

sources: VULHUB: VHN-138968 // JVNDB: JVNDB-2018-003359 // CNNVD: CNNVD-201803-796 // NVD: CVE-2018-8936

REFERENCES

url:https://amdflaws.com/

Trust: 1.7

url:https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/

Trust: 1.7

url:https://community.amd.com/community/amd-corporate/blog/2018/03/21/initial-amd-technical-assessment-of-cts-labs-research

Trust: 1.7

url:https://safefirmware.com/amdflaws_whitepaper.pdf

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8936

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-8936

Trust: 0.8

sources: VULHUB: VHN-138968 // JVNDB: JVNDB-2018-003359 // CNNVD: CNNVD-201803-796 // NVD: CVE-2018-8936

SOURCES

db:VULHUBid:VHN-138968
db:JVNDBid:JVNDB-2018-003359
db:CNNVDid:CNNVD-201803-796
db:NVDid:CVE-2018-8936

LAST UPDATE DATE

2024-11-23T23:12:13.734000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-138968date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2018-003359date:2018-05-22T00:00:00
db:CNNVDid:CNNVD-201803-796date:2019-10-23T00:00:00
db:NVDid:CVE-2018-8936date:2024-11-21T04:14:38.523

SOURCES RELEASE DATE

db:VULHUBid:VHN-138968date:2018-03-22T00:00:00
db:JVNDBid:JVNDB-2018-003359date:2018-05-22T00:00:00
db:CNNVDid:CNNVD-201803-796date:2018-03-23T00:00:00
db:NVDid:CVE-2018-8936date:2018-03-22T14:29:01.003