Show plain JSON{"id": "CVE-2018-12037", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 1.9, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 4.0, "attackVector": "PHYSICAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 0.4}]}, "published": "2018-11-20T19:29:00.247", "references": [{"url": "http://www.securityfocus.com/bid/105840", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028", "tags": ["Patch", "Third Party Advisory", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://security.netapp.com/advisory/ntap-20181112-0001/", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/105840", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028", "tags": ["Patch", "Third Party Advisory", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://security.netapp.com/advisory/ntap-20181112-0001/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered on Samsung 840 EVO and 850 EVO devices (only in \"ATA high\" mode, not vulnerable in \"TCG\" or \"ATA max\" mode), Samsung T3 and T5 portable drives, and Crucial MX100, MX200 and MX300 devices. Absence of a cryptographic link between the password and the Disk Encryption Key allows attackers with privileged access to SSD firmware full access to encrypted data."}, {"lang": "es", "value": "Se ha descubierto un problema en dispositivos Samsung 840 EVO y 850 EVO (solo en modo \"ATA high\"; no es vulnerable en los modos \"TCG\" o \"ATA max\"), los discos duros externos Samsung T3 y T5 y los dispositivos Crucial MX100, MX200 y MX300. La falta de un enlace criptogr\u00e1fico entre la contrase\u00f1a y la clave de cifrado del disco permite que los atacantes con acceso privilegiado al firmware SSD tengan acceso total a los datos cifrados."}], "lastModified": "2024-11-21T03:44:28.030", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:samsung:840_evo_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CCCBC3E-D0C8-4425-9262-7F158163F2EA"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:samsung:840_evo:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "32606060-FB21-4E49-8A9E-9A9197F6FAF4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:samsung:850_evo_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "294728E8-48DD-42E4-AE4B-683F59E9F7B5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:samsung:850_evo:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9A7CC49B-C58A-4D9F-98C6-BED4F978CE52"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:samsung:t3_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "080BBC54-1E9D-4D4E-8847-6A32FCC0477C"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:samsung:t3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FA7BC29D-D192-424B-BF23-092ACDB1F4AE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:samsung:t5_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "738D6719-CD1D-4F45-B695-5E6E92131057"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:samsung:t5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "588B48AC-6A9D-4BBF-B1E3-A112CD455746"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:micron:crucial_mx100_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FAA6CCE-F209-460E-BC3A-25DE787BE502"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:micron:crucial_mx100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B865DB0F-A464-43BF-A886-D7242C64FEAC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:micron:crucial_mx200_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6718348D-973E-4C28-A612-7A6189A49CD7"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:micron:crucial_mx200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71860471-8667-4373-9F13-5DF53366B025"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:micron:crucial_mx300_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7783258E-187C-426A-8A3A-9CC80D857F36"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:micron:crucial_mx300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D22E762E-E77A-440F-9E23-A25375DD8E3A"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}