CVE-2020-13799
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Western Digital has identified a security vulnerability in the Replay Protected Memory Block (RPMB) protocol as specified in multiple standards for storage device interfaces, including all versions of eMMC, UFS, and NVMe. The RPMB protocol is specified by industry standards bodies and is implemented by storage devices from multiple vendors to assist host systems in securing trusted firmware. Several scenarios have been identified in which the RPMB state may be affected by an attacker without the knowledge of the trusted component that uses the RPMB feature.
Western Digital ha identificado una vulnerabilidad de seguridad en el protocolo Replay Protected Memory Block (RPMB), tal como se especifica en múltiples estándares para interfaces de dispositivos de almacenamiento, incluyendo todas las versiones de eMMC, UFS y NVMe. El protocolo RPMB está especificado por los organismos de estándares de la industria y es implementado por los dispositivos de almacenamiento de múltiples proveedores para ayudar a los sistemas anfitriones a asegurar un firmware confiable. Se han identificado varios escenarios en los que el estado RPMB puede verse afectado por un atacante sin el conocimiento del componente de confianza que utiliza la función RPMB
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-06-03 CVE Reserved
- 2020-11-18 CVE Published
- 2024-08-04 CVE Updated
- 2024-09-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-294: Authentication Bypass by Capture-replay
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.kb.cert.org/vuls/id/231329 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Westerndigital Search vendor "Westerndigital" | Inand Cl Em132 Firmware Search vendor "Westerndigital" for product "Inand Cl Em132 Firmware" | <= 2020-06-03 Search vendor "Westerndigital" for product "Inand Cl Em132 Firmware" and version " <= 2020-06-03" | - |
Affected
| in | Westerndigital Search vendor "Westerndigital" | Inand Cl Em132 Search vendor "Westerndigital" for product "Inand Cl Em132" | - | - |
Safe
|
Westerndigital Search vendor "Westerndigital" | Inand Ix Em132 Firmware Search vendor "Westerndigital" for product "Inand Ix Em132 Firmware" | <= 2020-06-03 Search vendor "Westerndigital" for product "Inand Ix Em132 Firmware" and version " <= 2020-06-03" | - |
Affected
| in | Westerndigital Search vendor "Westerndigital" | Inand Ix Em132 Search vendor "Westerndigital" for product "Inand Ix Em132" | - | - |
Safe
|
Westerndigital Search vendor "Westerndigital" | Inand Ix Em132 Xi Firmware Search vendor "Westerndigital" for product "Inand Ix Em132 Xi Firmware" | <= 2020-06-03 Search vendor "Westerndigital" for product "Inand Ix Em132 Xi Firmware" and version " <= 2020-06-03" | - |
Affected
| in | Westerndigital Search vendor "Westerndigital" | Inand Ix Em132 Xi Search vendor "Westerndigital" for product "Inand Ix Em132 Xi" | - | - |
Safe
|
Linaro Search vendor "Linaro" | Op-tee Search vendor "Linaro" for product "Op-tee" | <= 3.11.0 Search vendor "Linaro" for product "Op-tee" and version " <= 3.11.0" | - |
Affected
|