René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

114 lines
3.8 KiB
JSON

{
"id": "CVE-2020-12926",
"sourceIdentifier": "psirt@amd.com",
"published": "2020-11-12T20:15:15.283",
"lastModified": "2020-11-30T17:05:13.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device."
},
{
"lang": "es",
"value": "Es posible que el software de referencia Trusted Platform Modules (TPM) no rastree correctamente la cantidad de veces que ocurre un apagado fallido. Esto puede dejar al TPM en un estado en el que el material de la clave confidencial del TPM puede verse comprometido. AMD cree que el ataque requiere acceso f\u00edsico al dispositivo porque la energ\u00eda debe encenderse y apagarse repetidamente. Este ataque potencial puede ser usado para cambiar informaci\u00f3n confidencial, alterar los ejecutables firmados por material de clave en el TPM o crear una denegaci\u00f3n de servicio del dispositivo"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
},
{
"source": "psirt@amd.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amd:trusted_platform_modules_reference:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAFE26DC-F3B5-4236-886D-98CD784A8197"
}
]
}
]
}
],
"references": [
{
"url": "https://www.amd.com/en/corporate/product-security",
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
]
}
]
}