Latest HPE Servers Security News #2

Let’s review latest HPE servers security news at this post. The news has been published by HPE during past week.

HPE Products using Server Platform Services (SPS), Local Escalation of Privilege

Potential Security Impact: Local: Escalation of Privilege

Vulnerability Summary

Security vulnerabilities in Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology may allow users to escalate privileges, disclose information or cause a denial of service. Intel is releasing Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology updates to mitigate these vulnerabilities.

Please see Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology 2019.1 QSR Advisory, PSIRT-TA-201901-002 for more information.

Improper data sanitization vulnerability in subsystem in Intel(R) Server Platform Services before versions SPS_E5_04.00.04.381.0, SPS_E3_04.01.04.054.0, SPS_SoC-A_04.00.04.181.0, and SPS_SoC-X_04.00.04.086.0 may allow privileged user to potentially enable escalation of privilege via local access.

Insufficient access control vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) Server Platform Services before version SPS_E3_05.00.04.027.0 may allow an unauthenticated user to enable escalation of privilege through physical access.

HPE ProLiant DL/ML/XL G10 affected by this vulnerability.

References:

  • CVE-2019-0089
  • CVE-2019-0090

Resolution

HPE has provided updated firmware to address these vulnerabilities.

HPE Products using certain Intel UEFI Reference Code, Local Escalation of Privilege, Denial of Service Vulnerabilities

Potential Security Impact: Local: Denial of Service (DoS), Escalation of Privilege

Vulnerability Summary

Security vulnerabilities in Intel reference code may allow for escalation of privilege or denial of service. Intel is releasing reference code updates to mitigate these potential vulnerabilities.

Please see Intel Technical Advisory Intel BIOS 2019.1 QSR, PSIRT-TA-201901-006 for more information.

Please also see the following two HPE Security Bulletins which describe other Intel-related processor vulnerabilities:

For Intel Technical Advisory Microarchitectural Data Sampling (MDS) PSIRT-TA-2019-02-002:

HPESBHF03933 rev.1 – HPE Products using certain Intel Processors, Microarchitectural Data Sampling (MDS) Side Channel Vulnerabilities, Local Disclosure of Information

For Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology 2019.1 QSR Advisory, PSIRT-TA-201901-002:

HPESBHF03931 rev.1 – HPE Products using Server Platform Services (SPS), Local Escalation of Privilege Vulnerability

UEFI firmware using Intel reference code has a buffer overflow vulnerability may allow a privileged user to enable escalation of privilege or cause a denial of service using local access.

UEFI firmware using Intel reference code provides insufficient access control that may allow a privileged user to enable escalation of privilege or cause a denial of service using local access.References:

  • CVE-2019-0119
  • CVE-2019-0126

Resolution

HPE has provided updated firmware to address these vulnerabilities.

HPE Products using certain Intel Processors, Microarchitectural Data Sampling (MDS) Side Channel Vulnerabilities, Local Disclosure of Information

Potential Security Impact: Local: Disclosure of Information

Vulnerability Summary

Security vulnerabilities in CPUs may allow information disclosure. Intel is releasing MCU updates to mitigate these potential vulnerabilities.

Please see Intel Technical Advisory Microarchitectural Data Sampling (MDS) PSIRT-TA-2019-02-002 as well as the Intel publication

Side Channel Vulnerability Microarchitectural Data Sampling (MDS) 

for more information.

Please also see the following two HPE Security Bulletins which describe other Intel-related processor vulnerabilities:

For Intel BIOS 2019.1 QSR, PSIRT-TA-201901-006:

HPESBHF03932 rev.1 – HPE Products using certain Intel UEFI Reference Code, Local Escalation of Privilege, Denial of Service Vulnerabilities

For Intel® CSME, Server Platform Services, Trusted Execution Engine and Intel® Active Management Technology 2019.1 QSR Advisory, PSIRT-TA-201901-002:

HPESBHF03931 rev.1 – HPE Products using Server Platform Services (SPS), Local Escalation of Privilege Vulnerability

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with localReferences:

  • CVE-2018-12126
  • CVE-2018-12127
  • CVE-2018-12130
  • CVE-2019-11091

Resolution

HPE has provided updated firmware to address these vulnerabilities.

Further Reading

Latest HPE Servers Security News #1

External Links

http://www.hpe.com/support/Security_Bulletin_Archive

Davoud Teimouri

Davoud Teimouri is as a professional blogger, vExpert 2015/2016/2017/2018/2019, VCA, MCITP. This blog is started with simple posts and now, it has large following readers.

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter and join other subscribers

Holler Box