First published: Tue Oct 16 2018(Updated: )
A logic error in MdeModulePkg in EDK II firmware may allow authenticated user to potentially bypass configuration access controls and escalate privileges via local access. External Reference: <a href="https://edk2-docs.gitbooks.io/security-advisory/content/edk-ii-authenticated-variable-bypass.html">https://edk2-docs.gitbooks.io/security-advisory/content/edk-ii-authenticated-variable-bypass.html</a> Upstream Bug: <a href="https://bugzilla.tianocore.org/show_bug.cgi?id=415">https://bugzilla.tianocore.org/show_bug.cgi?id=415</a>
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ovmf | <0:20180508-6.gitee3198e672e2.el7 | 0:20180508-6.gitee3198e672e2.el7 |
Tianocore EDK II | =udk2015 | |
Tianocore EDK II | =udk2017 | |
Tianocore EDK II | =udk2018 | |
ubuntu/edk2 | <0~20180205. | 0~20180205. |
ubuntu/edk2 | <0~20160408. | 0~20160408. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2018-3613.
The severity of CVE-2018-3613 is high with a CVSS score of 7.8.
The affected software for CVE-2018-3613 includes ovmf version 0:20180508-6.gitee3198e672e2.el7, EDK II UDK2015, UDK2017, and UDK2018.
CVE-2018-3613 may allow an authenticated user to potentially enable escalation of privilege, information disclosure, and/or denial of service via local access.
You can find more information about CVE-2018-3613 on the following references: [link1](https://edk2-docs.gitbooks.io/security-advisory/content/edk-ii-authenticated-variable-bypass.html), [link2](https://bugzilla.tianocore.org/show_bug.cgi?id=415), [link3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1641435).