// For flags

CVE-2018-19589

 

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Incorrect Access Controls of Security Officer (SO) in PKCS11 R2 provider that ships with the Utimaco CryptoServer HSM product package allows an SO authenticated to a slot to retrieve attributes of keys marked as private keys in external key storage, and also delete keys marked as private keys in external key storage. This compromises the availability of all keys configured with external key storage and may result in an economic attack in which the attacker denies legitimate users access to keys while maintaining possession of an encrypted copy (blob) of the external key store for ransom. This attack has been dubbed reverse ransomware attack and may be executed via a physical connection to the CryptoServer or remote connection if SSH or remote access to LAN CryptoServer has been compromised. The Confidentiality and Integrity of the affected keys, however, remain untarnished.

Los Controles de Acceso incorrectos del Security Officer (SO) en el proveedor PKCS11 R2 que se envía con el paquete del producto Utimaco CryptoServer HSM permite que un SO identificado en un espacio recupere los atributos de las claves marcadas como claves privadas en el almacenamiento de las claves externas, y también elimine las claves marcadas como claves privadas en el almacenamiento de las claves externas. Esto compromete la disponibilidad de todas las claves configuradas con almacenamiento de claves externas y puede resultar en un ataque económico en el cual el atacante niega el acceso de los usuarios legítimos a las claves mientras mantiene la posesión de una copia encriptada (blob) del almacén de clave externo para obtener un rescate. Este ataque se ha denominado ataque de ransomware inverso y puede ejecutarse por medio de una conexión física a CryptoServer o conexión remota si SSH o el acceso remoto a LAN CryptoServer se ha comprometido. La confidencialidad y la integridad de las claves afectadas, sin embargo, permanecen intactas.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-11-26 CVE Reserved
  • 2019-04-09 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Utimaco
Search vendor "Utimaco"
Securityserver Cse Firmware
Search vendor "Utimaco" for product "Securityserver Cse Firmware"
>= 4.00
Search vendor "Utimaco" for product "Securityserver Cse Firmware" and version " >= 4.00"
-
Affected
in Utimaco
Search vendor "Utimaco"
Securityserver Cse
Search vendor "Utimaco" for product "Securityserver Cse"
--
Safe