var-201811-0025
Vulnerability from variot
An issue was discovered on Samsung 840 EVO devices. Vendor-specific commands may allow access to the disk-encryption key. ATA Security mode and TCG OPAL There are multiple vulnerabilities in the self-encrypting drive product that implements the standard, which could allow the attacker to decrypt the contents of the encrypted drive. CVE-2018-12037 There is no cryptographic association between the password set by the user and the encryption key used for data encryption. This makes it possible to decrypt data without knowing the user-set password. CVE-2018-12038 Information about the data encryption key is recorded in a storage area with a wear leveling function. On devices with wear leveling, when data is updated, the data is written to a physically different location, so the original data may not be completely deleted. As a result, even after updating the data encryption key with a new password, there is a possibility of accessing the previous data encryption key that is not protected or protected with an old password.An attacker with physical access to a product affected by this vulnerability could decrypt the encrypted data. Self-Encrypting Drives are prone to a local security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may aid in further attacks. Samsung 840 EVO is a hard disk drive made by South Korea's Samsung (Samsung). , which may result in writing to different physical areas. An attacker in physical proximity could exploit this vulnerability to obtain passwords
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201811-0025", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "840 evo", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "micron", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "samsung semiconductor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sandisk", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "western digital", "version": null }, { "model": "crucial mx100 drive", "scope": "eq", "trust": 0.8, "vendor": "micron", "version": "(cve-2018-12037)" }, { "model": "crucial mx200 drive", "scope": "eq", "trust": 0.8, "vendor": "micron", "version": "(cve-2018-12037)" }, { "model": "crucial mx300 drive", "scope": "eq", "trust": 0.8, "vendor": "micron", "version": "(cve-2018-12037)" }, { "model": "840 evo drive", "scope": "eq", "trust": 0.8, "vendor": "samsung", "version": "(cve-2018-12037)(cve-2018-12038)" }, { "model": "850 evo drive", "scope": "eq", "trust": 0.8, "vendor": "samsung", "version": "(ata high it is affected in the case of mode. tcg mode or ata max the mode is not affected. )(cve-2018-12037)" }, { "model": "portable drive", "scope": "eq", "trust": 0.8, "vendor": "samsung", "version": "t3 (cve-2018-12037)" }, { "model": "portable drive", "scope": "eq", "trust": 0.8, "vendor": "samsung", "version": "t5 (cve-2018-12037)" }, { "model": "evo drives", "scope": "eq", "trust": 0.3, "vendor": "samsung", "version": "8400" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20190" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20160" }, { "model": "windows server r2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20120" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20120" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "18030" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "17090" }, { "model": "windows rt", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "8.1" }, { "model": "windows for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "8.10" }, { "model": "windows for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "8.10" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1018090" }, { "model": "windows version for arm64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1018090" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1018090" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1018030" }, { "model": "windows version for arm64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1018030" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1018030" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017090" }, { "model": "windows version for arm64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017090" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017090" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017030" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017030" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1016070" }, { "model": "windows version for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1016070" }, { "model": "windows for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "100" }, { "model": "windows for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "100" } ], "sources": [ { "db": "CERT/CC", "id": "VU#395981" }, { "db": "BID", "id": "105841" }, { "db": "JVNDB", "id": "JVNDB-2018-009133" }, { "db": "CNNVD", "id": "CNNVD-201811-170" }, { "db": "NVD", "id": "CVE-2018-12038" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:micron:crucial_mx100_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:micron:crucial_mx200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:micron:crucial_mx300_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:misc:samsung_electronics_samsung_840_evo_drive", "vulnerable": true }, { "cpe22Uri": "cpe:/a:misc:samsung_electronics_samsung_850_evo_drive", "vulnerable": true }, { "cpe22Uri": "cpe:/a:misc:samsung_electronics_samsung_portable_drive", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-009133" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carlo Meijer and Bernard van Gastel from the Dutch Radboud University", "sources": [ { "db": "BID", "id": "105841" } ], "trust": 0.3 }, "cve": "CVE-2018-12038", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2018-12038", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "None", "baseScore": 6.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2018-009133", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-121957", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.5, "id": "CVE-2018-12038", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2018-009133", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-12038", "trust": 1.0, "value": "MEDIUM" }, { "author": "JPCERT/CC", "id": "JVNDB-2018-009133", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201811-170", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-121957", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-121957" }, { "db": "JVNDB", "id": "JVNDB-2018-009133" }, { "db": "CNNVD", "id": "CNNVD-201811-170" }, { "db": "NVD", "id": "CVE-2018-12038" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered on Samsung 840 EVO devices. Vendor-specific commands may allow access to the disk-encryption key. ATA Security mode and TCG OPAL There are multiple vulnerabilities in the self-encrypting drive product that implements the standard, which could allow the attacker to decrypt the contents of the encrypted drive. CVE-2018-12037 There is no cryptographic association between the password set by the user and the encryption key used for data encryption. This makes it possible to decrypt data without knowing the user-set password. CVE-2018-12038 Information about the data encryption key is recorded in a storage area with a wear leveling function. On devices with wear leveling, when data is updated, the data is written to a physically different location, so the original data may not be completely deleted. As a result, even after updating the data encryption key with a new password, there is a possibility of accessing the previous data encryption key that is not protected or protected with an old password.An attacker with physical access to a product affected by this vulnerability could decrypt the encrypted data. Self-Encrypting Drives are prone to a local security-bypass vulnerability. \nAn attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may aid in further attacks. Samsung 840 EVO is a hard disk drive made by South Korea\u0027s Samsung (Samsung). , which may result in writing to different physical areas. An attacker in physical proximity could exploit this vulnerability to obtain passwords", "sources": [ { "db": "NVD", "id": "CVE-2018-12038" }, { "db": "CERT/CC", "id": "VU#395981" }, { "db": "JVNDB", "id": "JVNDB-2018-009133" }, { "db": "BID", "id": "105841" }, { "db": "VULHUB", "id": "VHN-121957" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#395981", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2018-12038", "trust": 2.8 }, { "db": "BID", "id": "105841", "trust": 2.0 }, { "db": "LENOVO", "id": "LEN-25256", "trust": 1.4 }, { "db": "JVN", "id": "JVNVU90149383", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-009133", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201811-170", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-121957", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#395981" }, { "db": "VULHUB", "id": "VHN-121957" }, { "db": "BID", "id": "105841" }, { "db": "JVNDB", "id": "JVNDB-2018-009133" }, { "db": "CNNVD", "id": "CNNVD-201811-170" }, { "db": "NVD", "id": "CVE-2018-12038" } ] }, "id": "VAR-201811-0025", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-121957" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:17:16.407000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSD Support", "trust": 0.8, "url": "http://www.crucial.com/usa/en/support-ssd-firmware" }, { "title": "BitLocker Group Policy Settings", "trust": 0.8, "url": "https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings" }, { "title": "Consumer Notice regarding Samsung SSDs", "trust": 0.8, "url": "https://www.samsung.com/semiconductor/minisite/ssd/support/consumer-notice/" }, { "title": "Samsung Self-Encrypting Drives Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86643" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-009133" }, { "db": "CNNVD", "id": "CNNVD-201811-170" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-320", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121957" }, { "db": "NVD", "id": "CVE-2018-12038" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180028" }, { "trust": 2.4, "url": "https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd" }, { "trust": 2.2, "url": "https://support.lenovo.com/us/en/product_security/len-25256" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/105841" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/395981" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20181112-0001/" }, { "trust": 1.6, "url": "https://www.ru.nl/english/news-agenda/news/vm/icis/cyber-security/2018/radboud-university-researchers-discover-security/" }, { "trust": 1.6, "url": "https://www.ncsc.nl/dienstverlening/response-op-dreigingen-en-incidenten/beveiligingsadviezen/ncsc-2018-0984+1.00+meerdere+kwetsbaarheden+ontdekt+in+implementaties+self-encrypting+drives.html" }, { "trust": 0.8, "url": "https://www.ru.nl/publish/pages/909282/draft-paper.pdf" }, { "trust": 0.8, "url": "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj679890(v=ws.11)#configure-use-of-hardware-based-encryption-for-fixed-data-drives" }, { "trust": 0.8, "url": "https://www.samsung.com/semiconductor/minisite/ssd/support/consumer-notice/" }, { "trust": 0.8, "url": "https://www.crucial.com/usa/en/support-ssd-firmware/" }, { "trust": 0.8, "url": "https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-hdefxd" }, { "trust": 0.8, "url": "https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-hdeosd" }, { "trust": 0.8, "url": "https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-hderdd" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-12037" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-12038" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90149383/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12037" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12038" }, { "trust": 0.8, "url": "https://kb.cert.org/vuls/id/395981/" }, { "trust": 0.3, "url": "http://www.crucial.com" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "http://www.samsung.com/" }, { "trust": 0.3, "url": "https://www.ru.nl/publish/pages/909275/draft-paper_1.pdf" }, { "trust": 0.3, "url": "https://www.kb.cert.org/vuls/id/395981/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#395981" }, { "db": "VULHUB", "id": "VHN-121957" }, { "db": "BID", "id": "105841" }, { "db": "JVNDB", "id": "JVNDB-2018-009133" }, { "db": "CNNVD", "id": "CNNVD-201811-170" }, { "db": "NVD", "id": "CVE-2018-12038" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#395981" }, { "db": "VULHUB", "id": "VHN-121957" }, { "db": "BID", "id": "105841" }, { "db": "JVNDB", "id": "JVNDB-2018-009133" }, { "db": "CNNVD", "id": "CNNVD-201811-170" }, { "db": "NVD", "id": "CVE-2018-12038" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-06T00:00:00", "db": "CERT/CC", "id": "VU#395981" }, { "date": "2018-11-20T00:00:00", "db": "VULHUB", "id": "VHN-121957" }, { "date": "2018-11-06T00:00:00", "db": "BID", "id": "105841" }, { "date": "2018-11-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-009133" }, { "date": "2018-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201811-170" }, { "date": "2018-11-20T19:29:00.353000", "db": "NVD", "id": "CVE-2018-12038" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-14T00:00:00", "db": "CERT/CC", "id": "VU#395981" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-121957" }, { "date": "2018-11-06T00:00:00", "db": "BID", "id": "105841" }, { "date": "2019-08-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-009133" }, { "date": "2020-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201811-170" }, { "date": "2024-11-21T03:44:28.190000", "db": "NVD", "id": "CVE-2018-12038" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "105841" }, { "db": "CNNVD", "id": "CNNVD-201811-170" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Self-encrypting hard drives do not adequately protect data", "sources": [ { "db": "CERT/CC", "id": "VU#395981" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201811-170" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.