Vulnerability Details : CVE-2019-18279
In Phoenix SCT WinFlash 1.1.12.0 through 1.5.74.0, the included drivers could be used by a malicious Windows application to gain elevated privileges. Adverse impacts are limited to the Windows environment and there is no known direct impact to the UEFI firmware. This was fixed in late June 2019.
Products affected by CVE-2019-18279
- Phoenix » Securecore TechnologyVersions from including (>=) 1.1.12.0 and up to, including, (<=) 1.5.74.0cpe:2.3:o:phoenix:securecore_technology:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-18279
0.57%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-18279
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-10-15 |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2019-18279
-
https://eclypsium.com/2019/08/10/screwed-drivers-signed-sealed-delivered/
Screwed Drivers – Signed, Sealed, Delivered - EclypsiumThird Party Advisory
-
https://www.phoenix.com/content/uploads/Security-Newsletter-September-2019.pdf
Vendor Advisory
-
https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf
Third Party Advisory
Jump to