6.9
CVE-2018-1992
- EPSS 0.04%
- Published 21.03.2019 16:00:33
- Last modified 21.11.2024 04:00:42
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
The IBM Power 9 OP910, OP920, and FW910 boot firmware's bootloader is responsible for loading and validating the initial boot firmware image that drives the rest of the system's hardware initialization. The bootloader firmware contains a buffer overflow vulnerability such that, if an attacker were able to replace the initial boot firmware image with a very carefully crafted and sufficiently large, malicious replacement, it could cause the bootloader, during the load of that image, to overwrite its own instruction memory and circumvent secure boot protections, install trojans, etc. IBM X-Force ID: 154345.
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ Power System S922 (9009-22a) Firmware Version < fw910.10
Ibm ≫ Power System H922 (9223-22h) Firmware Version < fw910.10
Ibm ≫ Power System S914 (9009-41a) Firmware Version < fw910.10
Ibm ≫ Power System S924 (9009-42a) Firmware Version < fw910.10
Ibm ≫ Power System H924 (9223-42h) Firmware Version < fw910.10
Ibm ≫ Power System L922 (9008-22l) Firmware Version < fw910.10
Ibm ≫ Power System Ac922 (8335-gtg) Firmware Version < op910.30
Ibm ≫ Power System Ac922 (8335-gth) Firmware Version < op920.10
Ibm ≫ Power System Ac922 (8335-gtx) Firmware Version < op920.10
Ibm ≫ Power System Lc921 (9006-12p) Firmware Version < op920.10
Ibm ≫ Power System Lc922 (9006-22p) Firmware Version < op920.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.096 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.4 | 0.5 | 5.9 |
CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.9 | 3.4 | 10 |
AV:L/AC:M/Au:N/C:C/I:C/A:C
|
psirt@us.ibm.com | 6.4 | 0.5 | 5.9 |
CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.