2023-12-08 19:00:22 +00:00

120 lines
3.7 KiB
JSON

{
"id": "CVE-2019-18279",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-11-13T18:15:11.000",
"lastModified": "2023-12-08T18:54:42.680",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In Phoenix SCT WinFlash 1.1.12.0 through 1.5.74.0, the included drivers could be used by a malicious Windows application to gain elevated privileges. Adverse impacts are limited to the Windows environment and there is no known direct impact to the UEFI firmware. This was fixed in late June 2019."
},
{
"lang": "es",
"value": "En Phoenix SCT WinFlash versiones 1.1.12.0 hasta 1.5.74.0, los controladores incluidos podr\u00edan ser utilizados por una aplicaci\u00f3n maliciosa de Windows para alcanzar privilegios elevados. Los impactos adversos est\u00e1n limitados al entorno de Windows y no se conoce un impacto directo en el firmware UEFI. Esto fue solucionado a finales de junio de 2019."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenix:securecore_technology:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.12.0",
"versionEndIncluding": "1.5.74.0",
"matchCriteriaId": "E8AFEF5A-A0B8-4044-A520-7252C30F075E"
}
]
}
]
}
],
"references": [
{
"url": "https://eclypsium.com/2019/08/10/screwed-drivers-signed-sealed-delivered/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.phoenix.com/content/uploads/Security-Newsletter-September-2019.pdf",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}