[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: speaking of hardware CVEs



> This timely article is
> out: 
> https://www.cylance.com/en_us/blog/uefi-ransomware-full-disclosure-at-
> black-hat-asia.html seems like some UEFI implementations are lacking 
> basic security checks/best practices, I would think failing to sue 
> those things should be CVE worthy in the modern world.

As far as we can tell, the vulnerabilities being reported are in the 
firmware and this would be covered by CVE.
 
An example of a hardware vulnerability would be if the SMM and SPI 
flash memory write protection were bypassed.  The advisory implies that 
they can bypass Intel's SGX, which might be a hardware vulnerability.  
We are not familiar enough with SGX to be certain.  One option might be 
to query the Intel CNA for help in this area.

> CVE has largely said they will not create for default credentials, 
> even when it means complete administrative access to the 
> app/device/OS 

MITRE does consider default credentials as CVE-worthy vulnerabilities.  
In fact, it is listed as an example of what a vulnerability is on the 
Terminology page of our website 
(https://cve.mitre.org/about/terminology.html).  

The CVE Team

-----Original Message-----
From: owner-cve-editorial-board-list@lists.mitre.org 
[mailto:owner-cve-editorial-board-list@lists.mitre.org] On Behalf Of 
Art Manion
Sent: Monday, March 13, 2017 12:36 PM
To: Kurt Seifried <kseifried@redhat.com>; cve-editorial-board-list 
<cve-editorial-board-list@lists.mitre.org>
Subject: Re: speaking of hardware CVEs

On 3/10/17 10:06 PM, Kurt Seifried wrote:

> This timely article is
> out: 
> https://www.cylance.com/en_us/blog/uefi-ransomware-full-disclosure-at-
> black-hat-asia.html seems like some UEFI implementations are lacking 
> basic security checks/best practices, I would think failing to sue 
> those things should be CVE worthy in the modern world.

I didn't read the Cylance page carefully, but there have been issues 
with BIOS/UEFI vulnerabilities that I'll argue are *software* and 
CVE-worthy.  BIOS is software.

On 3/12/17 11:59 PM, jericho wrote:

> CVE has largely said they will not create for default credentials, 
> even when it means complete administrative access to the 
> app/device/OS 
> [1]. If that isn't CVE-worthy, then "missing other best practices" 
> doesn't seem like it would qualify either.

Getting into the "lacking basic security" discussion, I'll argue that 
"insecure default configuration" should warrant a CVE in some cases 
(open ACLs on squid a long time ago, maybe mongoDB and memcached today, 
and yes, default/shared/hard-coded credentials when the vendor knows 
quite well in advance that the thing will be on the internet).

Vulnerabilities are also about surprise/expectations and interaction 
with (changing) environment; vulnerabilities aren't purely technical.  
I know, unsatisfying in an engineering sense, and changing the 
definition of "vulnerability that gets a CVE ID" makes the corpus messy.

Classification is messy, the world (and thinking about the world) 
changes, Pluto is a planet, Apatosaurus is not Brontosaurus.

 - Art

Page Last Updated or Reviewed: March 16, 2017