Lucene search

K
cveIntelCVE-2018-3689
HistoryApr 03, 2018 - 4:29 p.m.

CVE-2018-3689

2018-04-0316:29:00
intel
web.nvd.nist.gov
24
cve-2018-3689
aesm daemon
intel software guard extensions
linux
denial of service
remote attestation

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

5.5

Confidence

High

EPSS

0

Percentile

5.1%

AESM daemon in Intel Software Guard Extensions Platform Software Component for Linux before 2.1.102 can effectively be disabled by a local attacker creating a denial of services like remote attestation provided by the AESM.

Affected configurations

Nvd
Node
intelsoftware_guard_extensionsMatch-
AND
linuxlinux_kernelRange<2.1.102
VendorProductVersionCPE
intelsoftware_guard_extensions-cpe:2.3:a:intel:software_guard_extensions:-:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Guard Extensions Platform Software Component for Linux",
    "vendor": "Intel Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "before 2.1.102"
      }
    ]
  }
]

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

5.5

Confidence

High

EPSS

0

Percentile

5.1%

Related for CVE-2018-3689