ID

VAR-201906-0919


CVE

CVE-2019-0175


TITLE

Intel Multiple vulnerabilities in the product

Trust: 0.8

sources: JVNDB: JVNDB-2019-004980

DESCRIPTION

Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel OpenAttestation is an open source project of Intel Corporation for managing host integrity verification using the remote attestation protocol defined by TCG. A permissions and access control issue vulnerability exists in the authentication process in Intel OpenAttestation due to the program's failure to adequately authenticate sessions. A local attacker could exploit this vulnerability to elevate privileges

Trust: 0.99

sources: NVD: CVE-2019-0175 // VULHUB: VHN-140206

AFFECTED PRODUCTS

vendor:intelmodel:openattestationscope:eqversion: -

Trust: 1.0

vendor:intelmodel:open cloud integrity tehnologyscope:eqversion: -

Trust: 1.0

vendor:intelmodel:accelerated storage managerscope: - version: -

Trust: 0.8

vendor:intelmodel:chipset device softwarescope: - version: -

Trust: 0.8

vendor:intelmodel:compute cardscope: - version: -

Trust: 0.8

vendor:intelmodel:compute stickscope: - version: -

Trust: 0.8

vendor:intelmodel:core i3scope: - version: -

Trust: 0.8

vendor:intelmodel:core i5scope: - version: -

Trust: 0.8

vendor:intelmodel:core x-seriesscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kitscope: - version: -

Trust: 0.8

vendor:intelmodel:omni-path fabric manager guiscope: - version: -

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor 2000 series

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor 3000 series

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor g series

Trust: 0.8

vendor:intelmodel:proset/wireless software driverscope: - version: -

Trust: 0.8

vendor:intelmodel:raid web console v3scope:eqversion:for windows

Trust: 0.8

vendor:intelmodel:sgx dcap linux driverscope: - version: -

Trust: 0.8

vendor:intelmodel:sgx linux client driverscope: - version: -

Trust: 0.8

vendor:intelmodel:turbo boost max technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v3 family

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v5 family

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v7 family

Trust: 0.8

vendor:intelmodel:ite tech* consumer infrared driverscope:eqversion:for windows 10

Trust: 0.8

vendor:intelmodel:open cloud integrity technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:openattestationscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2019-004980 // NVD: CVE-2019-0175

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-0175
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-201906-569
value: MEDIUM

Trust: 0.6

VULHUB: VHN-140206
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2019-0175
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-140206
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-0175
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 2.5
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-140206 // CNNVD: CNNVD-201906-569 // NVD: CVE-2019-0175

PROBLEMTYPE DATA

problemtype:CWE-522

Trust: 1.1

problemtype:CWE-264

Trust: 0.1

sources: VULHUB: VHN-140206 // NVD: CVE-2019-0175

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201906-569

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201906-569

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004980

PATCH

title:[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html

Trust: 0.8

title:[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html

Trust: 0.8

title:[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html

Trust: 0.8

title:[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html

Trust: 0.8

title:[INTEL-SA-00264] Intel NUC Firmware Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html

Trust: 0.8

title:[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html

Trust: 0.8

title:[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html

Trust: 0.8

title:[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html

Trust: 0.8

title:[INTEL-SA-00235] Intel SGX for Linux Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html

Trust: 0.8

title:[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html

Trust: 0.8

title:[INTEL-SA-00247] Partial Physical Address Leakage Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html

Trust: 0.8

sources: JVNDB: JVNDB-2019-004980

EXTERNAL IDS

db:NVDid:CVE-2019-0175

Trust: 2.5

db:JVNid:JVNVU95572531

Trust: 0.8

db:JVNDBid:JVNDB-2019-004980

Trust: 0.8

db:CNNVDid:CNNVD-201906-569

Trust: 0.7

db:VULHUBid:VHN-140206

Trust: 0.1

sources: VULHUB: VHN-140206 // JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-569 // NVD: CVE-2019-0175

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-0175

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119

Trust: 0.8

url:http://jvn.jp/cert/jvnvu95572531

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0128

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0178

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11119

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0130

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0179

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11123

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0136

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0180

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11124

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0157

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0181

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11125

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0164

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0182

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11126

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0174

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0183

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11127

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11092

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11128

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-3702

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0177

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11117

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11129

Trust: 0.8

url:https://www.intel.com/content/www/us/en/security-center/advisory/in

Trust: 0.6

sources: VULHUB: VHN-140206 // JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-569 // NVD: CVE-2019-0175

SOURCES

db:VULHUBid:VHN-140206
db:JVNDBid:JVNDB-2019-004980
db:CNNVDid:CNNVD-201906-569
db:NVDid:CVE-2019-0175

LAST UPDATE DATE

2024-11-23T20:45:00.971000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-140206date:2023-02-27T00:00:00
db:JVNDBid:JVNDB-2019-004980date:2019-06-13T00:00:00
db:CNNVDid:CNNVD-201906-569date:2020-08-25T00:00:00
db:NVDid:CVE-2019-0175date:2024-11-21T04:16:24.787

SOURCES RELEASE DATE

db:VULHUBid:VHN-140206date:2019-06-13T00:00:00
db:JVNDBid:JVNDB-2019-004980date:2019-06-13T00:00:00
db:CNNVDid:CNNVD-201906-569date:2019-06-13T00:00:00
db:NVDid:CVE-2019-0175date:2019-06-13T16:29:00.937