CVE-2020-28368

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.

References

https://platypusattack.com

https://www.zdnet.com/article/new-platypus-attack-can-steal-data-from-intel-cpus/

https://xenbits.xen.org/xsa/advisory-351.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/XV23EZIMNLJN4YXRRXLQV2ALW6ZEALXV/

http://www.openwall.com/lists/oss-security/2020/11/26/1

http://xenbits.xen.org/xsa/advisory-351.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/5J66QUUHXH2RR4CNCKQRGVXVSOUFRPDA/

https://www.debian.org/security/2020/dsa-4804

Details

Source: MITRE

Published: 2020-11-10

Updated: 2022-01-01

Type: CWE-862

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 4.4

Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 0.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* versions up to 4.14.0 (inclusive)

Configuration 2

OR

cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
150513SUSE SLES11 Security Update : xen (SUSE-SU-2020:14557-1)NessusSuSE Local Security Checks
high
149227SUSE SLES15 Security Update : xen (SUSE-SU-2021:1460-1)NessusSuSE Local Security Checks
high
148365SUSE SLES12 Security Update : xen (SUSE-SU-2021:1023-1)NessusSuSE Local Security Checks
high
144102SUSE SLES12 Security Update : xen (SUSE-SU-2020:3742-1)NessusSuSE Local Security Checks
high
143881SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2020:3413-1)NessusSuSE Local Security Checks
medium
143878SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2020:3615-1)NessusSuSE Local Security Checks
high
143861SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2020:3611-1)NessusSuSE Local Security Checks
high
143824SUSE SLES12 Security Update : xen (SUSE-SU-2020:3653-1)NessusSuSE Local Security Checks
high
143703SUSE SLES12 Security Update : xen (SUSE-SU-2020:3415-1)NessusSuSE Local Security Checks
medium
143698SUSE SLES12 Security Update : xen (SUSE-SU-2020:3414-1)NessusSuSE Local Security Checks
medium
143675SUSE SLES12 Security Update : xen (SUSE-SU-2020:3612-1)NessusSuSE Local Security Checks
medium
143674SUSE SLES12 Security Update : xen (SUSE-SU-2020:3631-1)NessusSuSE Local Security Checks
high
143625SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2020:3412-1)NessusSuSE Local Security Checks
medium
143538openSUSE Security Update : xen (openSUSE-2020-2192)NessusSuSE Local Security Checks
high
143506openSUSE Security Update : xen (openSUSE-2020-2162)NessusSuSE Local Security Checks
high
143500Debian DSA-4804-1 : xen - security updateNessusDebian Local Security Checks
high
143397Fedora 33 : xen (2020-d71fa5f0b9)NessusFedora Local Security Checks
medium
143301openSUSE Security Update : xen (openSUSE-2020-2030)NessusSuSE Local Security Checks
medium
143298openSUSE Security Update : xen (openSUSE-2020-2017)NessusSuSE Local Security Checks
medium
143139Fedora 32 : xen (2020-2684e0fadd)NessusFedora Local Security Checks
medium
142889Xen Platypus information leak via power sidechannel (XSA-351)NessusMisc.
medium