ID

VAR-201807-0788


CVE

CVE-2018-13787


TITLE

plural Supermicro Access control vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-007980

DESCRIPTION

Certain Supermicro X11S, X10, X9, X8SI, K1SP, C9X299, C7, B1, A2, and A1 products have a misconfigured Descriptor Region, allowing OS programs to modify firmware. plural Supermicro The product contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Supermicro X11S and so on are different series of computer motherboards from Supermicro Computer in the United States. A security vulnerability exists in several Supermicro products. The vulnerability originates from a program with a misconfigured Descriptor Region. An attacker could exploit this vulnerability with the help of an operating system program to modify the firmware

Trust: 1.71

sources: NVD: CVE-2018-13787 // JVNDB: JVNDB-2018-007980 // VULHUB: VHN-123881

AFFECTED PRODUCTS

vendor:supermicromodel:x10qrhscope:eqversion: -

Trust: 1.6

vendor:supermicromodel:x10dscscope:eqversion: -

Trust: 1.6

vendor:supermicromodel:x10sbascope:eqversion: -

Trust: 1.6

vendor:supermicromodel:x11satscope:eqversion: -

Trust: 1.6

vendor:supermicromodel:x10sdescope:eqversion: -

Trust: 1.6

vendor:supermicromodel:x11sbascope:eqversion: -

Trust: 1.6

vendor:supermicromodel:x10dscpscope:eqversion: -

Trust: 1.6

vendor:supermicromodel:x10sddfscope:eqversion: -

Trust: 1.6

vendor:supermicromodel:x10dsnscope:eqversion: -

Trust: 1.6

vendor:supermicromodel:x10drxscope:eqversion: -

Trust: 1.6

vendor:supermicromodel:x10srwscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z370lscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drdscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z270lscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z170scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:b10driscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x9drffpscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:a2sanscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z270pscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x11srmscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drtlscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drwnscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drlnscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z170ocescope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10srgscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drulscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:b1driscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drghscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drtbscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:a1srmscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:a1sai1scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c9x299scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:a1saiscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drtscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10srascope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7q270scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drfgscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10ddwnscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:a1samscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10druxscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z97mfscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x11ssqlscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10dri1scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x11sszscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10srlscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:b10drgscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drh4scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10druscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10dalscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x9saescope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x8siescope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drffscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x8sitscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10daiscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drtsscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:a2savscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10srhscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7x99ocscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10srmscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drgscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x11saescope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drthscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drlscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10ddw4scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10daxscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x9drgqfscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drtpsscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z270cscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10daliscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x8siascope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x9drfscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10dgoscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x9dblscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x8siuscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10sdvfscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x9drthscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x11ssvscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:a2sapscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:b10drtscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x8silscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10ddw3scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z370iscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7h270scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:b1sd2tfscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x11ssqscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z270cgscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z170oscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10ddwiscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10sdvtscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:a1sascope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drlcscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:b1sa4scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x11sae mscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x11srascope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drgoscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z97ocscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z87ocscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10srdscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7b250scope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drdlscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:k1spesscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drwscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:k1spiscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:c7z270mscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x11ssnscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drsscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drcscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10sriscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drhscope:eqversion: -

Trust: 1.0

vendor:supermicromodel:x10drfrscope:eqversion: -

Trust: 1.0

vendor:super micro computermodel:a1srmscope: - version: -

Trust: 0.8

vendor:super micro computermodel:a2savscope: - version: -

Trust: 0.8

vendor:super micro computermodel:b1sd2tfscope: - version: -

Trust: 0.8

vendor:super micro computermodel:c7z97ocscope: - version: -

Trust: 0.8

vendor:super micro computermodel:c9x299scope: - version: -

Trust: 0.8

vendor:super micro computermodel:k1spiscope: - version: -

Trust: 0.8

vendor:super micro computermodel:x10swrscope: - version: -

Trust: 0.8

vendor:super micro computermodel:x11sszscope: - version: -

Trust: 0.8

vendor:super micro computermodel:x8siuscope: - version: -

Trust: 0.8

vendor:super micro computermodel:x9saescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-007980 // CNNVD: CNNVD-201807-488 // NVD: CVE-2018-13787

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-13787
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-13787
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201807-488
value: MEDIUM

Trust: 0.6

VULHUB: VHN-123881
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-13787
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-123881
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-13787
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-123881 // JVNDB: JVNDB-2018-007980 // CNNVD: CNNVD-201807-488 // NVD: CVE-2018-13787

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-123881 // JVNDB: JVNDB-2018-007980 // NVD: CVE-2018-13787

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201807-488

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201807-488

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-007980

PATCH

title:X10 Gen. Listingurl:https://www.supermicro.com/support/security_Intel-SA-00088.cfm?pg=X10#tab

Trust: 0.8

title:Multiple Supermicro Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84006

Trust: 0.6

sources: JVNDB: JVNDB-2018-007980 // CNNVD: CNNVD-201807-488

EXTERNAL IDS

db:NVDid:CVE-2018-13787

Trust: 2.5

db:JVNDBid:JVNDB-2018-007980

Trust: 0.8

db:CNNVDid:CNNVD-201807-488

Trust: 0.7

db:VULHUBid:VHN-123881

Trust: 0.1

sources: VULHUB: VHN-123881 // JVNDB: JVNDB-2018-007980 // CNNVD: CNNVD-201807-488 // NVD: CVE-2018-13787

REFERENCES

url:https://blog.eclypsium.com/2018/06/07/firmware-vulnerabilities-in-supermicro-systems/

Trust: 2.5

url:https://www.bleepingcomputer.com/news/security/firmware-vulnerabilities-disclosed-in-supermicro-server-products/

Trust: 1.7

url:https://www.supermicro.com/support/security_intel-sa-00088.cfm?pg=x10#tab

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13787

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-13787

Trust: 0.8

url:https://www.ibm.com/support/docview.wss?uid=ibm10869134

Trust: 0.6

sources: VULHUB: VHN-123881 // JVNDB: JVNDB-2018-007980 // CNNVD: CNNVD-201807-488 // NVD: CVE-2018-13787

SOURCES

db:VULHUBid:VHN-123881
db:JVNDBid:JVNDB-2018-007980
db:CNNVDid:CNNVD-201807-488
db:NVDid:CVE-2018-13787

LAST UPDATE DATE

2024-11-23T23:05:04.236000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-123881date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2018-007980date:2018-10-04T00:00:00
db:CNNVDid:CNNVD-201807-488date:2019-10-23T00:00:00
db:NVDid:CVE-2018-13787date:2024-11-21T03:47:59.033

SOURCES RELEASE DATE

db:VULHUBid:VHN-123881date:2018-07-09T00:00:00
db:JVNDBid:JVNDB-2018-007980date:2018-10-04T00:00:00
db:CNNVDid:CNNVD-201807-488date:2018-07-09T00:00:00
db:NVDid:CVE-2018-13787date:2018-07-09T18:29:00.560