CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
34.4%
Vulnerabilities in Intel Chipset affect IBM Cloud Pak System. IBM Cloud Pak System has addressed these vulnerabilities.
CVEID:CVE-2021-0060
**DESCRIPTION:**Intel SPS could allow a physical attacker to gain elevated privileges on the system, caused by insufficient compartmentalization in HECI subsystem. By sending a specially-crafted request, an attacker could exploit this vulnerability to gain elevated privileges.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/219020 for the current score.
CVSS Vector: (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H)
CVEID:CVE-2021-0147
**DESCRIPTION:**Intel Chipset firmware is vulnerable to a denial of service, caused by improper locking in the Power Management Controller (PMC). By sending a specially-crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 4.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/219022 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)
CVEID:CVE-2021-33068
**DESCRIPTION:**Intel AMT is vulnerable to a denial of service, caused by a NULL pointer dereference in the subsystem. By sending a specially-crafted request, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/219021 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L)
Affected Product(s) / Node /System(s) | Version(s) / Components |
---|---|
IBM Cloud Pak System | 2.3- 2.3.3.4 |
System X240 M5 Compute Node | UEFI |
System X3550 M5 | UEFI |
System SN550 | UEFI |
System SR630 | UEFI |
OEM-SR630 | UEFI |
For unsupported release/version/platform IBM recommends to upgrade to supported fixed release of the product.
Recommended Firmware updates are listed in the table below. Firmware have been updated with IBM Cloud Pak System v2.3.3.5.
Affected Product(s) / Node /System(s) | Version(s) / Components |
---|---|
IBM Cloud Pak System | 2.3.3.5 |
System X240 M5 Compute Node | UEFI C4E150B-3.40 |
System X3550 M5 | UEFI UEFI TBE154B-3.60 |
System SN550 | UEFI UEFI IVE176J-3.22 |
System SR630 | UEFI UEFI IVE176J-3.22 |
OEM-SR630 | UEFI UEFI IVE176J-3.22 |
For IBM Cloud Pak System v2.3.0.1, v2.3.1.1, v2.3.2.0, v2.3.3.0, v.2.3.3.1, v.2.3.3.2, v.2.3.3.3, v2.3.3.3 Interim Fix 1, v2.3.3.4
upgrade to IBM Cloud Pak System v2.3.3.5 at Fix Central
Information on upgrading : <http://www.ibm.com/support/docview.wss?uid=ibm10887959>
None
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | cloud_pak_system | 2.3 | cpe:2.3:a:ibm:cloud_pak_system:2.3:*:*:*:*:*:*:* |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
34.4%