Unknown
CVE-2018-3652
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2018-3652
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- atom c c2308,
- atom c c2316,
- atom c c2338,
- atom c c2350,
- atom c c2358,
- atom c c2508,
- atom c c2516,
- atom c c2518,
- atom c c2530,
- atom c c2538,
- atom c c2550,
- atom c c2558,
- atom c c2718,
- atom c c2730,
- atom c c2738,
- atom c c2750,
- atom c c2758,
- atom c c3308,
- atom c c3336,
- atom c c3338,
- atom c c3508,
- atom c c3538,
- atom c c3558,
- atom c c3708,
- atom c c3750,
- atom c c3758,
- atom c c3808,
- atom c c3830,
- atom c c3850,
- atom c c3858,
- atom c c3950,
- atom c c3955,
- atom c c3958,
- xeon bronze 3104 -,
- xeon bronze 3106 -,
- xeon d-1513n,
- xeon d-1518,
- xeon d-1520,
- xeon d-1521,
- xeon d-1523n,
- xeon d-1527,
- xeon d-1528,
- xeon d-1529,
- xeon d-1531,
- xeon d-1533n,
- xeon d-1537,
- xeon d-1539,
- xeon d-1540,
- xeon d-1541,
- xeon d-1543n,
- xeon d-1548,
- xeon d-1553n,
- xeon d-1557,
- xeon d-1559,
- xeon d-1567,
- xeon d-1571,
- xeon d-1577,
- xeon d-2123it,
- xeon d-2141i,
- xeon d-2142it,
- xeon d-2143it,
- xeon d-2145nt,
- xeon d-2146nt,
- xeon d-2161i,
- xeon d-2163it,
- xeon d-2166nt,
- xeon d-2173it,
- xeon d-2177nt,
- xeon d-2183it,
- xeon d-2187nt,
- xeon e3 1220 v5 -,
- xeon e3 1220 v6 -,
- xeon e3 1225 v5 -,
- xeon e3 1225 v6 -,
- xeon e3 1230 v5 -,
- xeon e3 1230 v6 -,
- xeon e3 1235l v5 -,
- xeon e3 1240 v5 -,
- xeon e3 1240 v6 -,
- xeon e3 1240l v5 -,
- xeon e3 1245 v5 -,
- xeon e3 1245 v6 -,
- xeon e3 1260l v5 -,
- xeon e3 1268l v5 -,
- xeon e3 1270 v5 -,
- xeon e3 1270 v6 -,
- xeon e3 1275 v5 -,
- xeon e3 1275 v6 -,
- xeon e3 1280 v5 -,
- xeon e3 1280 v6 -,
- xeon e3 1285 v6 -,
- xeon e3 1501l v6 -,
- xeon e3 1501m v6 -,
- xeon e3 1505l v5 -,
- xeon e3 1505l v6 -,
- xeon e3 1505m v5 -,
- xeon e3 1505m v6,
- xeon e3 1515m v5,
- xeon e3 1535m v5,
- xeon e3 1535m v6,
- xeon e3 1545m v5,
- xeon e3 1558l v5,
- xeon e3 1565l v5,
- xeon e3 1575m v5,
- xeon e3 1578l v5,
- xeon e3 1585 v5,
- xeon e3 1585l v5,
- xeon gold 5115,
- xeon gold 5118,
- xeon gold 5119t,
- xeon gold 5120,
- xeon gold 5120t,
- xeon gold 5122,
- xeon gold 6126,
- xeon gold 6126f,
- xeon gold 6126t,
- xeon gold 6128,
- xeon gold 6130,
- xeon gold 6130f,
- xeon gold 6130t,
- xeon gold 6132,
- xeon gold 6134,
- xeon gold 6134m,
- xeon gold 6136,
- xeon gold 6138,
- xeon gold 6138f,
- xeon gold 6138p,
- xeon gold 6138t,
- xeon gold 6140,
- xeon gold 6140m,
- xeon gold 6142,
- xeon gold 6142f,
- xeon gold 6142m,
- xeon gold 6144,
- xeon gold 6146,
- xeon gold 6148,
- xeon gold 6148f,
- xeon gold 6150,
- xeon gold 6152,
- xeon gold 6154,
- xeon platinum 8153,
- xeon platinum 8156,
- xeon platinum 8158,
- xeon platinum 8160,
- xeon platinum 8160f,
- xeon platinum 8160m,
- xeon platinum 8160t,
- xeon platinum 8164,
- xeon platinum 8168,
- xeon platinum 8170,
- xeon platinum 8170m,
- xeon platinum 8176,
- xeon platinum 8176f,
- xeon platinum 8176m,
- xeon platinum 8180,
- xeon platinum 8180m,
- xeon silver 4108,
- xeon silver 4109t,
- xeon silver 4110,
- xeon silver 4112,
- xeon silver 4114,
- xeon silver 4114t,
- xeon silver 4116,
- xeon silver 4116t
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: