#VU16680 Information disclosure in Wibukey


Published: 2018-12-24

Vulnerability identifier: #VU16680

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-3989

CWE-ID: CWE-200

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Wibukey
Server applications / Other server solutions

Vendor: Wibu Systems

Description
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to information exposure in the 0x8200E804 IOCTL handler functionality when handling malicious input. A local attacker can use a specially crafted IRP request, cause the driver to return uninitialized memory and disclose kernel memory.

Mitigation
Update to version 6.50.

Vulnerable software versions

Wibukey: 6.40.2400


External links
http://blog.talosintelligence.com/2018/12/vulnerability-spotlight-multiple-vulns-wibu.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability