Vulnerability Description
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intel | Converged Security Management Engine Firmware | >= 11.0.0, < 12.0.5 |
| Intel | Active Management Technology Firmware | < 12.0.5 |
| Intel | Manageability Engine Firmware | >= 9.0.0.0, < 11.0 |
| Siemens | Simatic Field Pg M5 Firmware | < 22.01.06 |
| Siemens | Simatic Field Pg M5 | - |
| Siemens | Simatic Ipc427E Firmware | < 21.01.09 |
| Siemens | Simatic Ipc427E | - |
| Siemens | Simatic Ipc477E Firmware | < 21.01.09 |
| Siemens | Simatic Ipc477E | - |
| Siemens | Simatic Ipc547E Firmware | < r1.30.0 |
| Siemens | Simatic Pc547E | - |
| Siemens | Simatic Pc547G Firmware | < r1.23.0 |
| Siemens | Simatic Ipc547G | - |
| Siemens | Simatic Ipc627D Firmware | < 19.02.11 |
| Siemens | Simatic Ipc627D | - |
| Siemens | Simatic Ipc647D Firmware | < 19.01.14 |
| Siemens | Simatic Ipc647D | - |
| Siemens | Simatic Ipc677D Firmware | < 19.02.11 |
| Siemens | Simatic Ipc677D | - |
| Siemens | Simatic Ipc827D Firmware | < 19.02.11 |
References
- http://www.securityfocus.com/bid/106996Third Party AdvisoryVDB Entry
- https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdfPatchThird Party Advisory
- https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05Third Party AdvisoryUS Government Resource
- https://security.netapp.com/advisory/ntap-20180924-0003/Third Party Advisory
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpeThird Party Advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.Vendor Advisory
- http://www.securityfocus.com/bid/106996Third Party AdvisoryVDB Entry
- https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdfPatchThird Party Advisory
- https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05Third Party AdvisoryUS Government Resource
- https://security.netapp.com/advisory/ntap-20180924-0003/Third Party Advisory
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpeThird Party Advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.Vendor Advisory
FAQ
What is CVE-2018-3616?
CVE-2018-3616 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key vi...
How severe is CVE-2018-3616?
CVE-2018-3616 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-3616?
Check the references section above for vendor advisories and patch information. Affected products include: Intel Converged Security Management Engine Firmware, Intel Active Management Technology Firmware, Intel Manageability Engine Firmware, Siemens Simatic Field Pg M5 Firmware, Siemens Simatic Field Pg M5.