2024-12-08 03:06:42 +00:00

124 lines
4.0 KiB
JSON

{
"id": "CVE-2021-32015",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-08T17:15:07.720",
"lastModified": "2024-11-21T06:06:43.023",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Nuvoton NPCT75x TPM 1.2 firmware 7.4.0.0, a local authenticated malicious user with high privileges could potentially gain unauthorized access to TPM non-volatile memory. NOTE: Upgrading to firmware version 7.4.0.1 will mitigate against the vulnerability, but version 7.4.0.1 is not TCG or Common Criteria (CC) certified. Nuvoton recommends that users apply the NPCT75x TPM 1.2 firmware update."
},
{
"lang": "es",
"value": "En Nuvoton NPCT75x TPM versi\u00f3n 1.2 versi\u00f3n de firmware 7.4.0.0, un usuario local malicioso y autenticado muy privilegiado podr\u00eda potencialmente conseguir acceso no autorizado a la memoria no vol\u00e1til del TPM. NOTA: actualizando a versi\u00f3n de firmware 7.4.0.1 mitigar\u00e1 la vulnerabilidad, pero versi\u00f3n 7.4.0.1 no est\u00e1 certificada por TCG o Common Criteria (CC). Nuvoton recomienda que los usuarios apliquen la actualizaci\u00f3n de firmware NPCT75x TPM 1.2"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"baseScore": 3.6,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nuvoton:npct75x_firmware:7.4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "19BF38D2-DADC-49F6-89E8-BA1C067D60E8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nuvoton:npct75x:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C0A204DC-91B8-4326-AE7B-1E8289C741E5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.nuvoton.com/support/product-related-information/security-advisories/sa-001/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.nuvoton.com/support/product-related-information/security-advisories/sa-001/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}