MITM attacks are possible. In some cases, the system may be completely compromised. Configuration and configuration settings of the system may be modified by an attacker. There is a risk of data corruption.

It can be exploited by tricking administrator into visiting specially crafted website. An attacker may trick administrator into installing a malicious OS module. Exploitation of this vulnerability may lead to user data confidentiality violation.

RCE in the secure OS module is possible. Exploitation of this vulnerability may lead to system data exfiltration. There is a risk of remote code execution. An attacker may run arbitrary code on the affected device.

Data in the secure OS module may be vulnerable to man-in-the-middle attacks. There is a risk of data interception. Data confidentiality may be violated.

CVE-2018-5246 has been assigned to this vulnerability. Information regarding a patch or upgrade has been released. However, it is still recommended that system administrators carefully check their systems. End users should follow safe Internet usage to avoid data interception. In order to minimize the risk of data interception, end users should only connect to trusted devices and locations.

References:

- http://blog.talosintelligence.com/2018/05/mitm-attacks-in-the-cloud

MITM attacks are possible. In some cases, the system may be completely compromised. Configuration and configuration settings of the system may be modified by an attacker. There is a risk of data corruption.

Vulnerability Details

Vulnerability Name: CVE-2022-38979

CVE ID: CVE-2018-5246

Vendor: MITM attacks are possible. In some cases, the system may be completely compromised. Configuration and configuration settings of the system may be modified by an attacker. There is a risk of data corruption.
Ease of Attack: Medium

Timeline

Published on: 09/16/2022 18:15:00 UTC
Last modified on: 09/17/2022 03:18:00 UTC

References