ID

VAR-201903-0986


CVE

CVE-2018-12199


TITLE

Intel CSME and TXE Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-014779

DESCRIPTION

Buffer overflow in an OS component in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel TXE version before 3.1.60 or 4.0.10 may allow a privileged user to potentially execute arbitrary code via physical access. Intel CSME and TXE Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both Intel Converged Security and Management Engine (CSME) and Intel TXE are products of Intel Corporation of the United States. Intel Converged Security and Management Engine is a security management engine. Intel TXE is a trusted execution engine with hardware authentication function used in CPU (Central Processing Unit). Buffer overflow vulnerabilities exist in OS components in Intel CSME and Intel TXE. An attacker in physical proximity could exploit this vulnerability to execute arbitrary code. The following products and versions are affected: Intel CSME prior to 11.8.60, prior to 11.11.60, prior to 11.22.60, prior to 12.0.20; Intel TXE prior to 3.1.60, prior to 4.0.10

Trust: 2.43

sources: NVD: CVE-2018-12199 // JVNDB: JVNDB-2018-014779 // JVNDB: JVNDB-2019-001582 // VULHUB: VHN-122134

AFFECTED PRODUCTS

vendor:intelmodel:converged security management enginescope:ltversion:11.11.60

Trust: 1.8

vendor:intelmodel:converged security management enginescope:ltversion:11.22.60

Trust: 1.8

vendor:intelmodel:converged security management enginescope:ltversion:11.8.60

Trust: 1.8

vendor:intelmodel:converged security management enginescope:ltversion:12.0.20

Trust: 1.8

vendor:intelmodel:trusted execution enginescope:ltversion:3.1.60

Trust: 1.8

vendor:intelmodel:trusted execution enginescope:ltversion:4.0.10

Trust: 1.8

vendor:intelmodel:converged security management enginescope:gteversion:11.10

Trust: 1.0

vendor:intelmodel:trusted execution enginescope:gteversion:3.0

Trust: 1.0

vendor:intelmodel:converged security management enginescope:gteversion:11.20

Trust: 1.0

vendor:intelmodel:trusted execution enginescope:gteversion:4.0

Trust: 1.0

vendor:intelmodel:converged security management enginescope:gteversion:12.0.0

Trust: 1.0

vendor:intelmodel:converged security management enginescope:gteversion:11.0

Trust: 1.0

vendor:intelmodel:accelerated storage managerscope: - version: -

Trust: 0.8

vendor:intelmodel:active management technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:csmescope: - version: -

Trust: 0.8

vendor:intelmodel:matrix storage managerscope: - version: -

Trust: 0.8

vendor:intelmodel:server platform servicesscope: - version: -

Trust: 0.8

vendor:intelmodel:sgx sdkscope: - version: -

Trust: 0.8

vendor:intelmodel:trusted execution enginescope: - version: -

Trust: 0.8

vendor:intelmodel:usb 3.0 creator utilityscope: - version: -

Trust: 0.8

vendor:intelmodel:intelscope: - version: -

Trust: 0.8

vendor:intelmodel:graphics driverscope:eqversion:for windows

Trust: 0.8

sources: JVNDB: JVNDB-2018-014779 // JVNDB: JVNDB-2019-001582 // NVD: CVE-2018-12199

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-12199
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-12199
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201903-537
value: MEDIUM

Trust: 0.6

VULHUB: VHN-122134
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-12199
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-122134
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-12199
baseSeverity: MEDIUM
baseScore: 6.2
vectorString: CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.3
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-122134 // JVNDB: JVNDB-2018-014779 // CNNVD: CNNVD-201903-537 // NVD: CVE-2018-12199

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-122134 // JVNDB: JVNDB-2018-014779 // NVD: CVE-2018-12199

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201903-537

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014779

PATCH

title:INTEL-SA-00185url:https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html

Trust: 0.8

title:INTEL-SA-00231 - Intel Accelerated Storage Manager in RSTe Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00231.html

Trust: 0.8

title:INTEL-SA-00185 - Intel CSME, Server Platform Services, Trusted Execution Engine and Intel Active Management Technology 2018.4 QSR Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00185.html

Trust: 0.8

title:INTEL-SA-00189 - Intel Graphics Driver for Windows* 2018.4 QSR Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html

Trust: 0.8

title:INTEL-SA-00191 - Intel Firmware 2018.4 QSR Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html

Trust: 0.8

title:INTEL-SA-00216 - Intel Matrix Storage Manager Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00216.html

Trust: 0.8

title:INTEL-SA-00217 - Intel Software Guard Extensions SDK Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00217.html

Trust: 0.8

title:INTEL-SA-00229 - Intel USB 3.0 Creator Utility Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00229.html

Trust: 0.8

title:Intel Converged Security and Management Engine and Intel TXE Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=90126

Trust: 0.6

sources: JVNDB: JVNDB-2018-014779 // JVNDB: JVNDB-2019-001582 // CNNVD: CNNVD-201903-537

EXTERNAL IDS

db:NVDid:CVE-2018-12199

Trust: 2.5

db:JVNid:JVNVU98344681

Trust: 1.6

db:JVNDBid:JVNDB-2019-001582

Trust: 1.6

db:JVNDBid:JVNDB-2018-014779

Trust: 0.8

db:CNNVDid:CNNVD-201903-537

Trust: 0.7

db:LENOVOid:LEN-25083

Trust: 0.6

db:NSFOCUSid:42984

Trust: 0.6

db:VULHUBid:VHN-122134

Trust: 0.1

sources: VULHUB: VHN-122134 // JVNDB: JVNDB-2018-014779 // JVNDB: JVNDB-2019-001582 // CNNVD: CNNVD-201903-537 // NVD: CVE-2018-12199

REFERENCES

url:https://security.netapp.com/advisory/ntap-20190318-0001/

Trust: 1.7

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00185.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-12199

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-12199

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98344681/

Trust: 0.8

url:https://jvndb.jvn.jp/ja/contents/2019/jvndb-2019-001582.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98344681

Trust: 0.8

url:https://support.lenovo.com/us/en/solutions/len-25083

Trust: 0.6

url:http://www.nsfocus.net/vulndb/42984

Trust: 0.6

sources: VULHUB: VHN-122134 // JVNDB: JVNDB-2018-014779 // JVNDB: JVNDB-2019-001582 // CNNVD: CNNVD-201903-537 // NVD: CVE-2018-12199

CREDITS

Intel ( http://www.intel.com/ ) ?? ??

Trust: 0.6

sources: CNNVD: CNNVD-201903-537

SOURCES

db:VULHUBid:VHN-122134
db:JVNDBid:JVNDB-2018-014779
db:JVNDBid:JVNDB-2019-001582
db:CNNVDid:CNNVD-201903-537
db:NVDid:CVE-2018-12199

LAST UPDATE DATE

2024-11-23T19:49:19.947000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-122134date:2019-04-23T00:00:00
db:JVNDBid:JVNDB-2018-014779date:2019-04-10T00:00:00
db:JVNDBid:JVNDB-2019-001582date:2019-03-15T00:00:00
db:CNNVDid:CNNVD-201903-537date:2019-08-29T00:00:00
db:NVDid:CVE-2018-12199date:2024-11-21T03:44:44.273

SOURCES RELEASE DATE

db:VULHUBid:VHN-122134date:2019-03-14T00:00:00
db:JVNDBid:JVNDB-2018-014779date:2019-04-10T00:00:00
db:JVNDBid:JVNDB-2019-001582date:2019-03-15T00:00:00
db:CNNVDid:CNNVD-201903-537date:2019-03-14T00:00:00
db:NVDid:CVE-2018-12199date:2019-03-14T20:29:00.600