var-201803-1356
Vulnerability from variot
NVIDIA Security Engine contains a vulnerability in the Deterministic Random Bit Generator (DRBG) where the DRBG does not properly initialize and store or transmits sensitive data using a weakened encryption scheme that is unable to protect sensitive data which may lead to information disclosure.This issue is rated as moderate. NVIDIA Security Engine Contains information disclosure vulnerabilities and cryptographic strength vulnerabilities.Information may be obtained. NVIDIASHIELDTV is a game console device from NVIDIA. SecurityEngine is one of the security engines. DeterministicRandomBitGenerator (DRBG) is one of the deterministic random bit generators. A security vulnerability exists in SecurityEngine's DRBG in NVIDIASHIELDTVSE 6.2 and earlier. An attacker could exploit this vulnerability to obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1356", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "android", scope: "eq", trust: 1.6, vendor: "google", version: null, }, { model: "shield tv", scope: "lte", trust: 1, vendor: "nvidia", version: "6.2", }, { model: "android", scope: null, trust: 0.8, vendor: "google", version: null, }, { model: "shield tv", scope: null, trust: 0.8, vendor: "nvidia", version: null, }, { model: "security engine", scope: null, trust: 0.6, vendor: "nvidia", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-05984", }, { db: "JVNDB", id: "JVNDB-2017-012850", }, { db: "NVD", id: "CVE-2017-6284", }, { db: "CNNVD", id: "CNNVD-201803-177", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:nvidia:shield_tv_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "6.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:nvidia:shield_tv:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2017-6284", }, ], }, cve: "CVE-2017-6284", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "NVD", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.9, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", trust: 1, userInteractionRequired: false, vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Local", authentication: "None", author: "NVD", availabilityImpact: "None", baseScore: 2.1, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2017-6284", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Low", trust: 0.8, userInteractionRequired: null, vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "CNVD", availabilityImpact: "NONE", baseScore: 6.6, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "CNVD-2018-05984", impactScore: 9.2, integrityImpact: "COMPLETE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:N", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "VULHUB", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.9, id: "VHN-114487", impactScore: 2.9, integrityImpact: "NONE", severity: "LOW", trust: 0.1, vectorString: "AV:L/AC:L/AU:N/C:P/I:N/A:N", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "None", baseScore: 5.5, baseSeverity: "Medium", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2017-6284", impactScore: null, integrityImpact: "None", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2017-6284", trust: 1.8, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2018-05984", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201803-177", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-114487", trust: 0.1, value: "LOW", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2018-05984", }, { db: "VULHUB", id: "VHN-114487", }, { db: "JVNDB", id: "JVNDB-2017-012850", }, { db: "NVD", id: "CVE-2017-6284", }, { db: "CNNVD", id: "CNNVD-201803-177", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "NVIDIA Security Engine contains a vulnerability in the Deterministic Random Bit Generator (DRBG) where the DRBG does not properly initialize and store or transmits sensitive data using a weakened encryption scheme that is unable to protect sensitive data which may lead to information disclosure.This issue is rated as moderate. NVIDIA Security Engine Contains information disclosure vulnerabilities and cryptographic strength vulnerabilities.Information may be obtained. NVIDIASHIELDTV is a game console device from NVIDIA. SecurityEngine is one of the security engines. DeterministicRandomBitGenerator (DRBG) is one of the deterministic random bit generators. A security vulnerability exists in SecurityEngine's DRBG in NVIDIASHIELDTVSE 6.2 and earlier. An attacker could exploit this vulnerability to obtain sensitive information", sources: [ { db: "NVD", id: "CVE-2017-6284", }, { db: "JVNDB", id: "JVNDB-2017-012850", }, { db: "CNVD", id: "CNVD-2018-05984", }, { db: "VULHUB", id: "VHN-114487", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2017-6284", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2017-012850", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201803-177", trust: 0.7, }, { db: "CNVD", id: "CNVD-2018-05984", trust: 0.6, }, { db: "VULHUB", id: "VHN-114487", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-05984", }, { db: "VULHUB", id: "VHN-114487", }, { db: "JVNDB", id: "JVNDB-2017-012850", }, { db: "NVD", id: "CVE-2017-6284", }, { db: "CNNVD", id: "CNNVD-201803-177", }, ], }, id: "VAR-201803-1356", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2018-05984", }, { db: "VULHUB", id: "VHN-114487", }, ], trust: 1.7, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-05984", }, ], }, last_update_date: "2023-12-18T13:28:59.436000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "トップページ", trust: 0.8, url: "https://www.android.com/intl/ja_jp/phones/", }, { title: "Answer ID 4631", trust: 0.8, url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4631", }, { title: "NVIDIASHIELDTVSecurityEngineDeterministicRandomBitGenerator Information Disclosure Vulnerability Patch", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/122739", }, { title: "NVIDIA SHIELD TV Security Engine Deterministic Random Bit Generator Security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=78938", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-05984", }, { db: "JVNDB", id: "JVNDB-2017-012850", }, { db: "CNNVD", id: "CNNVD-201803-177", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-200", trust: 1.9, }, { problemtype: "CWE-326", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-114487", }, { db: "JVNDB", id: "JVNDB-2017-012850", }, { db: "NVD", id: "CVE-2017-6284", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.3, url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4631", }, { trust: 1.7, url: "https://nvidia.custhelp.com/app/answers/detail/a_id/4787", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6284", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2017-6284", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-05984", }, { db: "VULHUB", id: "VHN-114487", }, { db: "JVNDB", id: "JVNDB-2017-012850", }, { db: "NVD", id: "CVE-2017-6284", }, { db: "CNNVD", id: "CNNVD-201803-177", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2018-05984", }, { db: "VULHUB", id: "VHN-114487", }, { db: "JVNDB", id: "JVNDB-2017-012850", }, { db: "NVD", id: "CVE-2017-6284", }, { db: "CNNVD", id: "CNNVD-201803-177", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-03-22T00:00:00", db: "CNVD", id: "CNVD-2018-05984", }, { date: "2018-03-06T00:00:00", db: "VULHUB", id: "VHN-114487", }, { date: "2018-04-24T00:00:00", db: "JVNDB", id: "JVNDB-2017-012850", }, { date: "2018-03-06T16:29:00.387000", db: "NVD", id: "CVE-2017-6284", }, { date: "2018-03-07T00:00:00", db: "CNNVD", id: "CNNVD-201803-177", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-03-22T00:00:00", db: "CNVD", id: "CNVD-2018-05984", }, { date: "2019-04-02T00:00:00", db: "VULHUB", id: "VHN-114487", }, { date: "2018-04-24T00:00:00", db: "JVNDB", id: "JVNDB-2017-012850", }, { date: "2019-04-02T18:29:00.567000", db: "NVD", id: "CVE-2017-6284", }, { date: "2019-04-03T00:00:00", db: "CNNVD", id: "CNNVD-201803-177", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-201803-177", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "NVIDIA Security Engine Vulnerable to information disclosure", sources: [ { db: "JVNDB", id: "JVNDB-2017-012850", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "information disclosure", sources: [ { db: "CNNVD", id: "CNNVD-201803-177", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.