ID

VAR-201909-0122


CVE

CVE-2019-5478


TITLE

Zynq UltraScale+ Vulnerability related to input validation on devices

Trust: 0.8

sources: JVNDB: JVNDB-2019-008879

DESCRIPTION

A weakness was found in Encrypt Only boot mode in Zynq UltraScale+ devices. This could lead to an adversary being able to modify the control fields of the boot image leading to an incorrect secure boot behavior. Zynq UltraScale+ The device contains an input validation vulnerability.Information may be tampered with

Trust: 1.71

sources: NVD: CVE-2019-5478 // JVNDB: JVNDB-2019-008879 // VULHUB: VHN-156913

AFFECTED PRODUCTS

vendor:amdmodel:zu5egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu5cgscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu6egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu2cgscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu11egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu28drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu15egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu42drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu49drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu46drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu19egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu3tegscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu4egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu7evscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu1egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu5evscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu67drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu47drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu27drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu4evscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu9egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu25drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu64drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu3egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu7egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu39drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu2egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu17egscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu21drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu43drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu6cgscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu3tcgscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu4cgscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu9cgscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu65drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu29drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu7cgscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu1cgscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu48drscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu3cgscope:eqversion: -

Trust: 1.0

vendor:amdmodel:zu63drscope:eqversion: -

Trust: 1.0

vendor:xilinxmodel:ultrascale+ mpsocscope: - version: -

Trust: 0.8

vendor:xilinxmodel:ultrascale+ rfsocscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2019-008879 // NVD: CVE-2019-5478

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-5478
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-5478
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201909-055
value: MEDIUM

Trust: 0.6

VULHUB: VHN-156913
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2019-5478
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-156913
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-5478
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-5478
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-156913 // JVNDB: JVNDB-2019-008879 // CNNVD: CNNVD-201909-055 // NVD: CVE-2019-5478

PROBLEMTYPE DATA

problemtype:CWE-345

Trust: 1.1

problemtype:CWE-657

Trust: 1.0

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-156913 // JVNDB: JVNDB-2019-008879 // NVD: CVE-2019-5478

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201909-055

TYPE

data forgery

Trust: 0.6

sources: CNNVD: CNNVD-201909-055

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-008879

PATCH

title:AR# 72588url:https://www.xilinx.com/support/answers/72588.html

Trust: 0.8

sources: JVNDB: JVNDB-2019-008879

EXTERNAL IDS

db:NVDid:CVE-2019-5478

Trust: 2.5

db:JVNDBid:JVNDB-2019-008879

Trust: 0.8

db:CNNVDid:CNNVD-201909-055

Trust: 0.6

db:VULHUBid:VHN-156913

Trust: 0.1

sources: VULHUB: VHN-156913 // JVNDB: JVNDB-2019-008879 // CNNVD: CNNVD-201909-055 // NVD: CVE-2019-5478

REFERENCES

url:https://github.com/inversepath/advisories/blob/master/security_advisory-ref_fsc-hwsec-vr2019-0001-xilinx_zu+-encrypt_only_secure_boot_bypass.txt

Trust: 1.7

url:https://www.xilinx.com/support/answers/72588.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-5478

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5478

Trust: 0.8

sources: VULHUB: VHN-156913 // JVNDB: JVNDB-2019-008879 // CNNVD: CNNVD-201909-055 // NVD: CVE-2019-5478

SOURCES

db:VULHUBid:VHN-156913
db:JVNDBid:JVNDB-2019-008879
db:CNNVDid:CNNVD-201909-055
db:NVDid:CVE-2019-5478

LAST UPDATE DATE

2024-11-27T23:01:07.471000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-156913date:2020-10-16T00:00:00
db:JVNDBid:JVNDB-2019-008879date:2019-09-09T00:00:00
db:CNNVDid:CNNVD-201909-055date:2020-10-21T00:00:00
db:NVDid:CVE-2019-5478date:2024-11-27T16:10:16.277

SOURCES RELEASE DATE

db:VULHUBid:VHN-156913date:2019-09-03T00:00:00
db:JVNDBid:JVNDB-2019-008879date:2019-09-09T00:00:00
db:CNNVDid:CNNVD-201909-055date:2019-09-03T00:00:00
db:NVDid:CVE-2019-5478date:2019-09-03T20:15:11.530