CVE-2018-12037 (GCVE-0-2018-12037)
Vulnerability from cvelistv5 – Published: 2018-11-20 19:00 – Updated: 2024-08-05 08:24
VLAI?
Summary
An issue was discovered on Samsung 840 EVO and 850 EVO devices (only in "ATA high" mode, not vulnerable in "TCG" or "ATA max" mode), Samsung T3 and T5 portable drives, and Crucial MX100, MX200 and MX300 devices. Absence of a cryptographic link between the password and the Disk Encryption Key allows attackers with privileged access to SSD firmware full access to encrypted data.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T08:24:03.648Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20181112-0001/"
},
{
"name": "105840",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/105840"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-11-06T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Samsung 840 EVO and 850 EVO devices (only in \"ATA high\" mode, not vulnerable in \"TCG\" or \"ATA max\" mode), Samsung T3 and T5 portable drives, and Crucial MX100, MX200 and MX300 devices. Absence of a cryptographic link between the password and the Disk Encryption Key allows attackers with privileged access to SSD firmware full access to encrypted data."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-11-21T10:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20181112-0001/"
},
{
"name": "105840",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/105840"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-12037",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on Samsung 840 EVO and 850 EVO devices (only in \"ATA high\" mode, not vulnerable in \"TCG\" or \"ATA max\" mode), Samsung T3 and T5 portable drives, and Crucial MX100, MX200 and MX300 devices. Absence of a cryptographic link between the password and the Disk Encryption Key allows attackers with privileged access to SSD firmware full access to encrypted data."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security.netapp.com/advisory/ntap-20181112-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181112-0001/"
},
{
"name": "105840",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105840"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028",
"refsource": "MISC",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-12037",
"datePublished": "2018-11-20T19:00:00.000Z",
"dateReserved": "2018-06-07T00:00:00.000Z",
"dateUpdated": "2024-08-05T08:24:03.648Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:840_evo_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CCCBC3E-D0C8-4425-9262-7F158163F2EA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:840_evo:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32606060-FB21-4E49-8A9E-9A9197F6FAF4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:850_evo_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"294728E8-48DD-42E4-AE4B-683F59E9F7B5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:850_evo:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A7CC49B-C58A-4D9F-98C6-BED4F978CE52\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:t3_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"080BBC54-1E9D-4D4E-8847-6A32FCC0477C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:t3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA7BC29D-D192-424B-BF23-092ACDB1F4AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:t5_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"738D6719-CD1D-4F45-B695-5E6E92131057\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:t5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"588B48AC-6A9D-4BBF-B1E3-A112CD455746\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:micron:crucial_mx100_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FAA6CCE-F209-460E-BC3A-25DE787BE502\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:micron:crucial_mx100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B865DB0F-A464-43BF-A886-D7242C64FEAC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:micron:crucial_mx200_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6718348D-973E-4C28-A612-7A6189A49CD7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:micron:crucial_mx200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71860471-8667-4373-9F13-5DF53366B025\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:micron:crucial_mx300_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7783258E-187C-426A-8A3A-9CC80D857F36\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:micron:crucial_mx300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D22E762E-E77A-440F-9E23-A25375DD8E3A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered on Samsung 840 EVO and 850 EVO devices (only in \\\"ATA high\\\" mode, not vulnerable in \\\"TCG\\\" or \\\"ATA max\\\" mode), Samsung T3 and T5 portable drives, and Crucial MX100, MX200 and MX300 devices. Absence of a cryptographic link between the password and the Disk Encryption Key allows attackers with privileged access to SSD firmware full access to encrypted data.\"}, {\"lang\": \"es\", \"value\": \"Se ha descubierto un problema en dispositivos Samsung 840 EVO y 850 EVO (solo en modo \\\"ATA high\\\"; no es vulnerable en los modos \\\"TCG\\\" o \\\"ATA max\\\"), los discos duros externos Samsung T3 y T5 y los dispositivos Crucial MX100, MX200 y MX300. La falta de un enlace criptogr\\u00e1fico entre la contrase\\u00f1a y la clave de cifrado del disco permite que los atacantes con acceso privilegiado al firmware SSD tengan acceso total a los datos cifrados.\"}]",
"id": "CVE-2018-12037",
"lastModified": "2024-11-21T03:44:28.030",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 4.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.4, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 1.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.4, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-11-20T19:29:00.247",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/105840\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"Vendor Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20181112-0001/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/105840\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"Vendor Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20181112-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-12037\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-11-20T19:29:00.247\",\"lastModified\":\"2024-11-21T03:44:28.030\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered on Samsung 840 EVO and 850 EVO devices (only in \\\"ATA high\\\" mode, not vulnerable in \\\"TCG\\\" or \\\"ATA max\\\" mode), Samsung T3 and T5 portable drives, and Crucial MX100, MX200 and MX300 devices. Absence of a cryptographic link between the password and the Disk Encryption Key allows attackers with privileged access to SSD firmware full access to encrypted data.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en dispositivos Samsung 840 EVO y 850 EVO (solo en modo \\\"ATA high\\\"; no es vulnerable en los modos \\\"TCG\\\" o \\\"ATA max\\\"), los discos duros externos Samsung T3 y T5 y los dispositivos Crucial MX100, MX200 y MX300. La falta de un enlace criptogr\u00e1fico entre la contrase\u00f1a y la clave de cifrado del disco permite que los atacantes con acceso privilegiado al firmware SSD tengan acceso total a los datos cifrados.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.4,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":1.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:840_evo_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CCCBC3E-D0C8-4425-9262-7F158163F2EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:840_evo:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32606060-FB21-4E49-8A9E-9A9197F6FAF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:850_evo_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"294728E8-48DD-42E4-AE4B-683F59E9F7B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:850_evo:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A7CC49B-C58A-4D9F-98C6-BED4F978CE52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:t3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"080BBC54-1E9D-4D4E-8847-6A32FCC0477C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:t3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7BC29D-D192-424B-BF23-092ACDB1F4AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:t5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738D6719-CD1D-4F45-B695-5E6E92131057\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:t5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"588B48AC-6A9D-4BBF-B1E3-A112CD455746\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:micron:crucial_mx100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FAA6CCE-F209-460E-BC3A-25DE787BE502\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:micron:crucial_mx100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B865DB0F-A464-43BF-A886-D7242C64FEAC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:micron:crucial_mx200_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6718348D-973E-4C28-A612-7A6189A49CD7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:micron:crucial_mx200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71860471-8667-4373-9F13-5DF53366B025\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:micron:crucial_mx300_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7783258E-187C-426A-8A3A-9CC80D857F36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:micron:crucial_mx300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D22E762E-E77A-440F-9E23-A25375DD8E3A\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/105840\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20181112-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/105840\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180028\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20181112-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…