ID

VAR-201707-0437


CVE

CVE-2017-5691


TITLE

Intel Vulnerabilities related to authorization, authority, and access control in processors

Trust: 0.8

sources: JVNDB: JVNDB-2017-006951

DESCRIPTION

Incorrect check in Intel processors from 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Product Families, and Intel Xeon E3-1200 v5 and v6 Product Families allows compromised system firmware to impact SGX security via incorrect early system state. Intel The processor contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple Lenovo Products are prone to a local privilege escalation vulnerability. A local attacker can leverage this issue to gain elevated privileges. Intel NUC7i3BNK (KBL) and so on are mini desktops of Intel Corporation of the United States. Several Intel products have security vulnerabilities. Attackers can exploit this vulnerability to control the system firmware and affect the security of SGX. The following products are affected: Intel NUC7i3BNK (KBL); NUC7i5BNK; NUC7i7BNH; STK2MV64CC (SKL); STK2M3W64CC (SKL); NUC6i7KYK (SKL); NUC6i3SYK (SKL); R1208SPOSHORR; Intel Server System LR1304SPCFG1R; Intel Server System R1208SPOSHOR; Intel Server Board S1200SPSR; Intel Server Board S1200SPOR; S1200SPLR; Intel Server System R1304SPOSHBNR. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesb3p03767en_us SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesb3p03767en_us Version: 1 HPESB3P03767 rev.1 - HPE Proliant ML10 Gen9 servers using Intel Xeon E3-1200M v5 and 6th Generation Intel Core Processors, Unauthorized Write to Filesystem NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-08-03 Last Updated: 2017-08-03 Potential Security Impact: Local: Unauthorized Write Access to the File System; Remote: Unauthorized Write Access to the File System Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY A potential security problem has been identified in HPE Proliant ML10 Gen9 server using Intel Xeon E3-1200M v5 and 6th Generation Intel Core Processors. The vulnerability could allow a remote unauthorized attacker to write to file systems. References: - CVE-2017-5691 - Intel SGX Update and Attestation Key Recovery SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HPE ProLiant ML10 Gen9 E3-1225 v5 3.3GHz 4-core 8GB-R 1TB Non-hot Plug 4LFF SATA 300W AP Svr/Promo SP - HPE ProLiant ML10 Gen9 E3-1225 v5 4GB-R 1TB Non-hot Plug 4LFF SATA 300W Svr/S-Buy SP - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 1TB Non-hot Plug 4LFF SATA 300W Perf Svr SP - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W Svr/GO SP - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W Svr/TV SP - HPE ProLiant ML10 Gen9 G4400 4GB-R Non-hot Plug 4LFF SATA 300W Entry Svr SP BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2017-5691 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has provided the following update: * Update to ML10 Gen 9 BIOS 1.07, which contains the 0xBA microcode update, will patch the SGX security issue. Available for download at this link: - <https://www.hpe.com/global/swpublishing/MTX-df1494b3e9df455caf95a63c42> **Note:** Please contact HPE Technical Support if any assistance is needed with this information. HISTORY Version:1 (rev.1) - 4 August 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBCAAGBQJZg4xWAAoJELXhAxt7SZaijWIH/1bWATsLRK3sL2+urTNKGBnG gvVj0Oej02UmL1NY2sOeRJGV5ZO7NOvHlw7/+xgVEWaAOnlMgU22FEFOz7pMaSst MSgLWpraxYkh6uyncQjlaXQKgm+icOT6R/zDOYgw3Wm+GdyTO1eFXVpKGgCiTb24 /Bs12WZdvTDXefjHHbgR1T29EIzLtswFWNezsBQSLoy+CJ64tdtUAoyMi5hZjG7k 09dFJQ2PDIU8zRaa1+eiHzX1Qg5avT+L37aFdWQrd6+yXzsmh3xWqHUdnwUrqwZe DcC6XLY9TBbv1znuzSHhSY2cSwWZdIMb776C/90GDfXD78YDv05LFmxFBonTVKQ= =igsr -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2017-5691 // JVNDB: JVNDB-2017-006951 // BID: 100493 // VULHUB: VHN-113894 // PACKETSTORM: 143663

AFFECTED PRODUCTS

vendor:intelmodel:r1304sposhor biosscope:eqversion: -

Trust: 1.6

vendor:intelmodel:nuc6i7kyk biosscope:eqversion: -

Trust: 1.6

vendor:intelmodel:nuc7i5bnk biosscope:eqversion: -

Trust: 1.6

vendor:intelmodel:r1304sposhorr biosscope:eqversion: -

Trust: 1.6

vendor:intelmodel:stk2mv64cc biosscope:eqversion: -

Trust: 1.6

vendor:intelmodel:nuc7i3bnk biosscope:eqversion: -

Trust: 1.6

vendor:intelmodel:nuc6i3syk biosscope:eqversion: -

Trust: 1.6

vendor:intelmodel:stk2m3w64cc biosscope:eqversion: -

Trust: 1.6

vendor:intelmodel:nuc7i7bnh biosscope:eqversion: -

Trust: 1.6

vendor:intelmodel:nuc6i5syk biosscope:eqversion: -

Trust: 1.6

vendor:intelmodel:s1200spl biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:s1200spsr biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:r1208sposhorr biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:r1304sposhbn biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:s1200spor biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:lr1304spcfg1r biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:lr1304spcfg1 biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:r1304sposhbnr biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:s1200spo biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:s1200sps biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:r1208sposhor biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:s1200splr biosscope:eqversion: -

Trust: 1.0

vendor:intelmodel:compute stick stk2m3w64ccscope: - version: -

Trust: 0.8

vendor:intelmodel:compute stick stk2mv64ccscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kit nuc6i3sykscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kit nuc6i5sykscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kit nuc6i7kykscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kit nuc7i3bnkscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kit nuc7i5bnkscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kit nuc7i7bnhscope: - version: -

Trust: 0.8

vendor:intelmodel:server board s1200splscope: - version: -

Trust: 0.8

vendor:intelmodel:server board s1200splrscope: - version: -

Trust: 0.8

vendor:intelmodel:server board s1200sposcope: - version: -

Trust: 0.8

vendor:intelmodel:server board s1200sporscope: - version: -

Trust: 0.8

vendor:intelmodel:server board s1200spsscope: - version: -

Trust: 0.8

vendor:intelmodel:server board s1200spsrscope: - version: -

Trust: 0.8

vendor:intelmodel:server system lr1304spcfg1scope: - version: -

Trust: 0.8

vendor:intelmodel:server system lr1304spcfg1rscope: - version: -

Trust: 0.8

vendor:intelmodel:server system r1208sposhorscope: - version: -

Trust: 0.8

vendor:intelmodel:server system r1208sposhorrscope: - version: -

Trust: 0.8

vendor:intelmodel:server system r1304sposhbnscope: - version: -

Trust: 0.8

vendor:intelmodel:server system r1304sposhbnrscope: - version: -

Trust: 0.8

vendor:intelmodel:server system r1304sposhorscope: - version: -

Trust: 0.8

vendor:intelmodel:server system r1304sposhorrscope: - version: -

Trust: 0.8

vendor:lenovomodel:thinkstationscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkserverscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:thinkpadscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:ideapadscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:desktop all in onescope:eqversion:-0

Trust: 0.3

vendor:lenovomodel:desktopscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon® e3-1500mscope:eqversion:v50

Trust: 0.3

vendor:intelmodel:xeon® e3-1200scope:eqversion:v60

Trust: 0.3

vendor:intelmodel:xeon® e3-1200scope:eqversion:v50

Trust: 0.3

vendor:intelmodel:xeon® e3- 1500mscope:eqversion:v60

Trust: 0.3

sources: BID: 100493 // JVNDB: JVNDB-2017-006951 // CNNVD: CNNVD-201707-1323 // NVD: CVE-2017-5691

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-5691
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-5691
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201707-1323
value: CRITICAL

Trust: 0.6

VULHUB: VHN-113894
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-5691
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-113894
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-5691
baseSeverity: CRITICAL
baseScore: 9.0
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.3
impactScore: 6.0
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-113894 // JVNDB: JVNDB-2017-006951 // CNNVD: CNNVD-201707-1323 // NVD: CVE-2017-5691

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-113894 // JVNDB: JVNDB-2017-006951 // NVD: CVE-2017-5691

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 143663 // CNNVD: CNNVD-201707-1323

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201707-1323

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-006951

PATCH

title:HPESB3P03767url:https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesb3p03767en_us

Trust: 0.8

title:INTEL-SA-00076url:https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00076&languageid=en-fr

Trust: 0.8

title:Multiple Intel Product Privilege License and Access Control Vulnerability Fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74817

Trust: 0.6

sources: JVNDB: JVNDB-2017-006951 // CNNVD: CNNVD-201707-1323

EXTERNAL IDS

db:NVDid:CVE-2017-5691

Trust: 2.9

db:LENOVOid:LEN-15184

Trust: 2.0

db:JVNDBid:JVNDB-2017-006951

Trust: 0.8

db:CNNVDid:CNNVD-201707-1323

Trust: 0.7

db:BIDid:100493

Trust: 0.4

db:PACKETSTORMid:143663

Trust: 0.2

db:VULHUBid:VHN-113894

Trust: 0.1

sources: VULHUB: VHN-113894 // BID: 100493 // JVNDB: JVNDB-2017-006951 // PACKETSTORM: 143663 // CNNVD: CNNVD-201707-1323 // NVD: CVE-2017-5691

REFERENCES

url:https://support.lenovo.com/us/en/product_security/len-15184

Trust: 2.0

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00076&languageid=en-fr

Trust: 1.9

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesb3p03767en_us

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2017-5691

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5691

Trust: 0.8

url:http://www.lenovo.com/ca/en/

Trust: 0.3

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesb3p03767en_us

Trust: 0.1

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00076&amp;languageid=en-fr

Trust: 0.1

url:https://www.hpe.com/global/swpublishing/mtx-df1494b3e9df455caf95a63c42>

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesb3p03767en_us

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

sources: VULHUB: VHN-113894 // BID: 100493 // JVNDB: JVNDB-2017-006951 // PACKETSTORM: 143663 // CNNVD: CNNVD-201707-1323 // NVD: CVE-2017-5691

CREDITS

The vendor reported the issue.

Trust: 0.3

sources: BID: 100493

SOURCES

db:VULHUBid:VHN-113894
db:BIDid:100493
db:JVNDBid:JVNDB-2017-006951
db:PACKETSTORMid:143663
db:CNNVDid:CNNVD-201707-1323
db:NVDid:CVE-2017-5691

LAST UPDATE DATE

2024-11-23T22:22:31.227000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-113894date:2019-10-03T00:00:00
db:BIDid:100493date:2017-07-27T00:00:00
db:JVNDBid:JVNDB-2017-006951date:2017-09-07T00:00:00
db:CNNVDid:CNNVD-201707-1323date:2019-10-23T00:00:00
db:NVDid:CVE-2017-5691date:2024-11-21T03:28:13.767

SOURCES RELEASE DATE

db:VULHUBid:VHN-113894date:2017-07-26T00:00:00
db:BIDid:100493date:2017-07-27T00:00:00
db:JVNDBid:JVNDB-2017-006951date:2017-09-07T00:00:00
db:PACKETSTORMid:143663date:2017-08-05T02:44:09
db:CNNVDid:CNNVD-201707-1323date:2017-07-26T00:00:00
db:NVDid:CVE-2017-5691date:2017-07-26T15:29:00.283