Latest HPE Servers Security News #2
Let’s review latest HPE servers security news at this post. The news has been published by HPE during past week.
HPE Products using Server Platform Services (SPS), Local Escalation of Privilege
Potential Security Impact: Local: Escalation of Privilege
Vulnerability Summary
Security vulnerabilities in Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology may allow users to escalate privileges, disclose information or cause a denial of service. Intel is releasing Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology updates to mitigate these vulnerabilities.
Please see Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology 2019.1 QSR Advisory, PSIRT-TA-201901-002 for more information.
Improper data sanitization vulnerability in subsystem in Intel(R) Server Platform Services before versions SPS_E5_04.00.04.381.0, SPS_E3_04.01.04.054.0, SPS_SoC-A_04.00.04.181.0, and SPS_SoC-X_04.00.04.086.0 may allow privileged user to potentially enable escalation of privilege via local access.
Insufficient access control vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) Server Platform Services before version SPS_E3_05.00.04.027.0 may allow an unauthenticated user to enable escalation of privilege through physical access.
HPE ProLiant DL/ML/XL G10 affected by this vulnerability.
References:
- CVE-2019-0089
- CVE-2019-0090
Resolution
HPE has provided updated firmware to address these vulnerabilities.
HPE Products using certain Intel UEFI Reference Code, Local Escalation of Privilege, Denial of Service Vulnerabilities
Potential Security Impact: Local: Denial of Service (DoS), Escalation of Privilege
Vulnerability Summary
Security vulnerabilities in Intel reference code may allow for escalation of privilege or denial of service. Intel is releasing reference code updates to mitigate these potential vulnerabilities.
Please see Intel Technical Advisory Intel BIOS 2019.1 QSR, PSIRT-TA-201901-006 for more information.
Please also see the following two HPE Security Bulletins which describe other Intel-related processor vulnerabilities:
For Intel Technical Advisory Microarchitectural Data Sampling (MDS) PSIRT-TA-2019-02-002:
For Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology 2019.1 QSR Advisory, PSIRT-TA-201901-002:
UEFI firmware using Intel reference code has a buffer overflow vulnerability may allow a privileged user to enable escalation of privilege or cause a denial of service using local access.
UEFI firmware using Intel reference code provides insufficient access control that may allow a privileged user to enable escalation of privilege or cause a denial of service using local access.References:
- CVE-2019-0119
- CVE-2019-0126
Resolution
HPE has provided updated firmware to address these vulnerabilities.
HPE Products using certain Intel Processors, Microarchitectural Data Sampling (MDS) Side Channel Vulnerabilities, Local Disclosure of Information
Potential Security Impact: Local: Disclosure of Information
Vulnerability Summary
Security vulnerabilities in CPUs may allow information disclosure. Intel is releasing MCU updates to mitigate these potential vulnerabilities.
Please see Intel Technical Advisory Microarchitectural Data Sampling (MDS) PSIRT-TA-2019-02-002 as well as the Intel publication
Side Channel Vulnerability Microarchitectural Data Sampling (MDS)
for more information.
Please also see the following two HPE Security Bulletins which describe other Intel-related processor vulnerabilities:
For Intel BIOS 2019.1 QSR, PSIRT-TA-201901-006:
For Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology 2019.1 QSR Advisory, PSIRT-TA-201901-002:
Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with localReferences:
- CVE-2018-12126
- CVE-2018-12127
- CVE-2018-12130
- CVE-2019-11091
Resolution
HPE has provided updated firmware to address these vulnerabilities.
Further Reading
Latest HPE Servers Security News #1