Lucene search

K
nessusThis script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.SMB_NT_MS19_FEB_OOB_MICROCODE.NASL
HistoryMar 20, 2019 - 12:00 a.m.

Security Updates for Windows 10 / Windows Server 2019 (February 2019) (Spectre) (Meltdown) (Foreshadow)

2019-03-2000:00:00
This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
141

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

7.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.8%

The remote Windows host is missing a security update. It is, therefore, missing microcode updates to address the following vulnerabilities:

  • Spectre Variant 3a (CVE-2018-3640: Rogue System Register Read (RSRE)).

  • Spectre Variant 4 (CVE-2018-3639: Speculative Store Bypass (SSB))

  • L1TF (CVE-2018-3620, CVE-2018-3646: L1 Terminal Fault)

Note that Nessus did not actually test for these flaws nor checked the target processor architecture but instead, has relied on the version of mcupdate_GenuineIntel.dll to be latest for supported Windows release.

#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(122974);
  script_version("1.7");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/17");

  script_cve_id(
    "CVE-2018-3620",
    "CVE-2018-3639",
    "CVE-2018-3640",
    "CVE-2018-3646"
  );
  script_bugtraq_id(104228, 104232, 105080);
  script_xref(name:"MSKB", value:"4465065");
  script_xref(name:"MSKB", value:"4346084");
  script_xref(name:"MSKB", value:"4346085");
  script_xref(name:"MSKB", value:"4346086");
  script_xref(name:"MSKB", value:"4346087");
  script_xref(name:"MSFT", value:"MS19-4465065");
  script_xref(name:"MSFT", value:"MS19-4346084");
  script_xref(name:"MSFT", value:"MS19-4346085");
  script_xref(name:"MSFT", value:"MS19-4346086");
  script_xref(name:"MSFT", value:"MS19-4346087");

  script_name(english:"Security Updates for Windows 10 / Windows Server 2019 (February 2019) (Spectre) (Meltdown) (Foreshadow)");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host is missing a microcode update.");
  script_set_attribute(attribute:"description", value:
"The remote Windows host is missing a security update. It is,
therefore, missing microcode updates to address the following
vulnerabilities:

  - Spectre Variant 3a (CVE-2018-3640: Rogue System Register Read (RSRE)).

  - Spectre Variant 4 (CVE-2018-3639: Speculative Store Bypass (SSB))

  - L1TF (CVE-2018-3620, CVE-2018-3646: L1 Terminal Fault)

Note that Nessus did not actually test for these flaws nor checked the
target processor architecture but instead, has relied on the version
of mcupdate_GenuineIntel.dll to be latest for supported Windows release.");
  # https://support.microsoft.com/en-ie/help/4465065/kb4465065-intel-microcode-updates
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6b54af4a");
  # https://support.microsoft.com/en-ie/help/4346084/kb4346084-intel-microcode-updates
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2d0e32dc");
  # https://support.microsoft.com/en-us/help/4346085/kb4346085-intel-microcode-updates
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?91f9cc84");
  # https://support.microsoft.com/en-ie/help/4346086/kb4346086-intel-microcode-updates
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?236ac8ce");
  # https://support.microsoft.com/en-au/help/4346087/kb4346087-intel-microcode-updates
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?bcc8c14e");
  # https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8c467280");
  script_set_attribute(attribute:"solution", value:
"Microsoft has released security updates for Windows 10, Server 2016 and Server 2019.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-3646");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"in_the_news", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/05/22");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/02/04");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/03/20");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows_server_2019");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows : Microsoft Bulletins");

  script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("smb_check_rollup.nasl", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl", "enumerate_ms_azure_vm_win.nbin");
  script_require_keys("SMB/MS_Bulletin_Checks/Possible", "Settings/ParanoidReport");
  script_require_ports(139, 445, "Host/patch_management_checks");

  exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");
include("smb_reg_query.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

if (!empty_or_null(get_kb_list("Host/Azure/azure-*")))
  audit(AUDIT_HOST_NOT, "affected");

bulletin = 'MS19-02';

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

get_kb_item_or_exit("SMB/Registry/Enumerated");
ver = get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

# No update for other Windows OS versions, skip testing
if (hotfix_check_sp_range(win10:'0') <= 0) 
  exit(0, "Windows version " + ver + " is not tested.");

# No update for version 1511 and RTM, skip testing
os_build = get_kb_item("SMB/WindowsVersionBuild");
if((os_build == "10586") || (os_build == "10240"))
  exit(0, "Windows version " + ver + ", build " + os_build + " is not tested.");

share = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

if (
  # 1607
  hotfix_is_vulnerable(os:"10", sp:0, os_build:"14393", file:"mcupdate_genuineintel.dll", version:"10.0.14393.2756", min_version:"10.0.14393.0", dir:"\system32", bulletin:bulletin, kb:"4346087") ||

  # 1703
  hotfix_is_vulnerable(os:"10", sp:0, os_build:"15063", file:"mcupdate_genuineintel.dll", version:"10.0.15063.1594", min_version:"10.0.15063.0", dir:"\system32", bulletin:bulletin, kb:"4346086") ||

  # 1709
  hotfix_is_vulnerable(os:"10", sp:0, os_build:"16299", file:"mcupdate_genuineintel.dll", version:"10.0.16299.936", min_version:"10.0.16299.0", dir:"\system32", bulletin:bulletin, kb:"4346085") ||

  # 1803
  hotfix_is_vulnerable(os:"10", sp:0, os_build:"17134", file:"mcupdate_genuineintel.dll", version:"10.0.17134.554", min_version:"10.0.17134.0", dir:"\system32", bulletin:bulletin, kb:"4346084") ||

  # 1809
  hotfix_is_vulnerable(os:"10", sp:0, os_build:"17763", file:"mcupdate_genuineintel.dll", version:"10.0.17763.252", min_version:"10.0.17763.0", dir:"\system32", bulletin:bulletin, kb:"4465065")
)
{
  replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
  hotfix_security_warning();
  exit(0);
}
else
{
  audit(AUDIT_HOST_NOT, 'affected');
}
VendorProductVersionCPE
microsoftwindows_server_2019cpe:/o:microsoft:windows_server_2019

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

7.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.8%