Описание
In Phoenix SCT WinFlash 1.1.12.0 through 1.5.74.0, the included drivers could be used by a malicious Windows application to gain elevated privileges. Adverse impacts are limited to the Windows environment and there is no known direct impact to the UEFI firmware. This was fixed in late June 2019.
In Phoenix SCT WinFlash 1.1.12.0 through 1.5.74.0, the included drivers could be used by a malicious Windows application to gain elevated privileges. Adverse impacts are limited to the Windows environment and there is no known direct impact to the UEFI firmware. This was fixed in late June 2019.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-18279
- https://eclypsium.com/2019/08/10/screwed-drivers-signed-sealed-delivered
- https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf
- https://www.phoenix.com/content/uploads/Security-Newsletter-September-2019.pdf
Связанные уязвимости
In Phoenix SCT WinFlash 1.1.12.0 through 1.5.74.0, the included drivers could be used by a malicious Windows application to gain elevated privileges. Adverse impacts are limited to the Windows environment and there is no known direct impact to the UEFI firmware. This was fixed in late June 2019.
Уязвимость утилиты загрузки обновления, резервного копирования и восстановления BIOS с флэш-устройства Phoenix WinPhlash (ранее Phoenix SecureCore Tiano WinFlash), связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии