Unknown
Missing System x Flash Memory Write Protection Lock Bit
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
Missing System x Flash Memory Write Protection Lock Bit
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A write protection lock bit was left unset after boot on an older generation of Lenovo and IBM System x servers, potentially allowing an attacker with administrator access to modify the subset of flash memory containing Intel Server Platform Services (SPS) and the system Flash Descriptors.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Products
- bladecenter hs23 firmware,
- bladecenter hs23e firmware,
- flex system x220 m4 firmware,
- flex system x222 m4 firmware,
- flex system x240 m4 firmware,
- flex system x280 x6 firmware,
- flex system x440 m4 firmware,
- flex system x480 x6 firmware,
- flex system x880 x6 firmware,
- idataplex dx360 m4 firmware,
- idataplex dx360 m4 water cooled firmware,
- system x3100 m4 firmware,
- system x3100 m5 firmware,
- system x3250 m4 firmware,
- system x3250 m5 firmware,
- system x3300 m4 firmware,
- system x3500 m4 firmware,
- system x3530 m4 firmware,
- system x3550 m4 firmware,
- system x3630 m4 firmware,
- system x3650 m4 bd firmware,
- system x3650 m4 firmware,
- system x3650 m4 hd firmware,
- system x3750 m4 firmware,
- system x3850 x6 firmware,
- system x3950 x6 firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: