cve-2021-38576
Vulnerability from cvelistv5
Published
2022-01-03 21:07
Modified
2024-08-04 01:44
Severity
Summary
A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system.
References
SourceURLTags
infosec@edk2.groups.iohttps://bugzilla.tianocore.org/show_bug.cgi?id=3499Issue Tracking, Permissions Required, Third Party Advisory
Impacted products
VendorProduct
n/aEDK II
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:44:23.604Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.tianocore.org/show_bug.cgi?id=3499"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EDK II",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "edk2-stable202105, edk2-stable202102, edk2-stable202011, edk2-stable202008, edk2-stable202005, edk2-stable202002, edk2-stable201911, edk2-stable201908, edk2-stable201905, edk2-stable201903, edk2-stable201811, edk2-stable201808"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Security Feature Bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-03T21:07:45",
        "orgId": "65518388-201a-4f93-8712-366d21fe8d2c",
        "shortName": "TianoCore"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.tianocore.org/show_bug.cgi?id=3499"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "infosec@edk2.groups.io",
          "ID": "CVE-2021-38576",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EDK II",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "edk2-stable202105, edk2-stable202102, edk2-stable202011, edk2-stable202008, edk2-stable202005, edk2-stable202002, edk2-stable201911, edk2-stable201908, edk2-stable201905, edk2-stable201903, edk2-stable201811, edk2-stable201808"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Security Feature Bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.tianocore.org/show_bug.cgi?id=3499",
              "refsource": "MISC",
              "url": "https://bugzilla.tianocore.org/show_bug.cgi?id=3499"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "65518388-201a-4f93-8712-366d21fe8d2c",
    "assignerShortName": "TianoCore",
    "cveId": "CVE-2021-38576",
    "datePublished": "2022-01-03T21:07:45",
    "dateReserved": "2021-08-11T00:00:00",
    "dateUpdated": "2024-08-04T01:44:23.604Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-38576\",\"sourceIdentifier\":\"infosec@edk2.groups.io\",\"published\":\"2022-01-03T22:15:09.903\",\"lastModified\":\"2022-01-13T16:21:04.917\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system.\"},{\"lang\":\"es\",\"value\":\"Un error de la BIOS en el firmware de un determinado modelo de PC deja vac\u00edo el valor de autorizaci\u00f3n de la plataforma. Esto puede ser usado para brickear permanentemente el TPM de m\u00faltiples maneras, as\u00ed como para DoS no permanente del sistema\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:201808:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8757385B-6944-488F-B565-417A37C24774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:201811:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C29B4B-635D-498E-BFA0-C99810C7867F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:201903:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A599E9E7-B318-4C66-A2F8-6137DE9EF8AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:201905:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A3F577A-A397-4185-B477-C31065B6F598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:201908:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76E6EC0C-BA9E-47AD-9A8E-D40BE97CAAFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:201911:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2AFB7F1-63CF-4E11-8FD5-1E8D054616CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:202002:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02217318-D1DB-41BB-BE48-89BC3F0FA38C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:202005:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5193EFCE-3330-48FA-8C63-4CE328A2D339\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:202008:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C45BEB6-1F89-4813-B2CF-90639F9CE525\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:202011:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C76CE4FB-3BDE-464B-9807-093839D6DB24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:202102:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"063761E2-5C4D-480F-90FE-41D5ECC35E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:202105:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07F01519-D5C8-4BEE-A89B-8090F9A415CF\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.tianocore.org/show_bug.cgi?id=3499\",\"source\":\"infosec@edk2.groups.io\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...