Vulnerability Name: | CVE-2020-13799 (CCN-191524) | ||||||||||||
Assigned: | 2020-11-10 | ||||||||||||
Published: | 2020-11-10 | ||||||||||||
Updated: | 2021-06-29 | ||||||||||||
Summary: | Western Digital has identified a security vulnerability in the Replay Protected Memory Block (RPMB) protocol as specified in multiple standards for storage device interfaces, including all versions of eMMC, UFS, and NVMe. The RPMB protocol is specified by industry standards bodies and is implemented by storage devices from multiple vendors to assist host systems in securing trusted firmware. Several scenarios have been identified in which the RPMB state may be affected by an attacker without the knowledge of the trusted component that uses the RPMB feature. | ||||||||||||
CVSS v3 Severity: | 6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-294 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-13799 Source: CCN Type: US-CERT VU#231329 Replay Protected Memory Block (RPMB) protocol does not adequately defend against replay attacks Source: XF Type: UNKNOWN rpmb-cve202013799-priv-esc(191524) Source: CCN Type: Lenovo Security Advisory: LEN-39432 Intel CSME, SPS, TXE, DAL and AMT Advisory Source: CCN Type: INTEL-SA-00391 2020.2 IPU Intel CSME, SPS, TXE, AMT and DAL Advisory Source: MISC Type: Third Party Advisory, US Government Resource https://www.kb.cert.org/vuls/id/231329 Source: CCN Type: Western Digital WDC-20008 Replay Attack Vulnerabilities in RPMB Protocol Applications Source: CONFIRM Type: Vendor Advisory https://www.westerndigital.com/support/productsecurity/wdc-20008-replay-attack-vulnerabilities-rpmb-protocol-applications | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |