Vulnerability Details : CVE-2018-3989
An exploitable kernel memory disclosure vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400).A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to trigger this vulnerability.
Products affected by CVE-2018-3989
- cpe:2.3:a:wibu:wibukey:6.40:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-3989
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-3989
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST | |
4.3
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N |
2.5
|
1.4
|
Talos |
CWE ids for CVE-2018-3989
-
The product uses or accesses a resource that has not been initialized.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-3989
-
http://www.securityfocus.com/bid/107005
Wibu Systems WibuKey DRM Multiple Input Validation VulnerabilitiesThird Party Advisory;VDB Entry
-
https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf
Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf
Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf
-
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657
TALOS-2018-0657 || Cisco Talos Intelligence Group - Comprehensive Threat IntelligenceExploit;Third Party Advisory
Jump to