First published: Tue Nov 10 2020(Updated: )
Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | <=4.14.0 | |
Fedora | =32 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28368 is classified as a medium severity vulnerability due to its potential to expose sensitive information through side-channel attacks.
To mitigate CVE-2020-28368, you should update Xen to versions 4.14.6 or later, or to the specified remedy versions available from Debian and Fedora.
CVE-2020-28368 affects administrators of guest operating systems running vulnerable versions of Xen.
CVE-2020-28368 involves a side-channel attack leveraging power/energy monitoring interfaces to extract sensitive information.
CVE-2020-28368 requires local access to the guest OS, making it less likely to be exploited remotely, but still poses a significant risk.