CVE-2019-1125

Current Description

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.

Basic Data

PublishedSeptember 03, 2019
Last ModifiedSeptember 10, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-200
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score2.1
SeverityLOW
Exploitability Score3.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 3 - Attack VectorLOCAL
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredLOW
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactNONE
CVSS 3 - Availability ImpactNONE
CVSS 3 - Base Score5.5
CVSS 3 - Base SeverityMEDIUM
Exploitability Score1.8
Base SeverityMEDIUM

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSMicrosoftWindows 10-*******
    2.3OSMicrosoftWindows 101607*******
    2.3OSMicrosoftWindows 101703*******
    2.3OSMicrosoftWindows 101709*******
    2.3OSMicrosoftWindows 101803*******
    2.3OSMicrosoftWindows 101809*******
    2.3OSMicrosoftWindows 101903*******
    2.3OSMicrosoftWindows 7-sp1******
    2.3OSMicrosoftWindows 8.1-*******
    2.3OSMicrosoftWindows Rt 8.1-*******
    2.3OSMicrosoftWindows Server 2008-sp2******
    2.3OSMicrosoftWindows Server 2008r2sp1****itanium*
    2.3OSMicrosoftWindows Server 2008r2sp1****x64*
    2.3OSMicrosoftWindows Server 2012-*******
    2.3OSMicrosoftWindows Server 2012r2*******
    2.3OSMicrosoftWindows Server 2016-*******
    2.3OSMicrosoftWindows Server 20161803*******
    2.3OSMicrosoftWindows Server 20161903*******
    2.3OSMicrosoftWindows Server 2019-*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatVirtualization Host4.0*******
    2.3OSRedhatEnterprise Linux Desktop7.0*******
    2.3OSRedhatEnterprise Linux Server7.0*******
    2.3OSRedhatEnterprise Linux Server Aus7.7*******
    2.3OSRedhatEnterprise Linux Server Eus7.7*******
    2.3OSRedhatEnterprise Linux Server Tus7.7*******
    2.3OSRedhatEnterprise Linux Workstation7.0*******

Vulnerable Software List

VendorProductVersions
Microsoft Windows 7 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2012 -, r2
Microsoft Windows Server 2016 -, 1803, 1903
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 -, r2
Microsoft Windows 10 -, 1607, 1703, 1709, 1803, 1809, 1903
Microsoft Windows Rt 8.1 -
Redhat Enterprise Linux Workstation 7.0
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Server Eus 7.7
Redhat Enterprise Linux Server 7.0

References

NameSourceURLTags
http://packetstormsecurity.com/files/156337/SWAPGS-Attack-Proof-Of-Concept.htmlhttp://packetstormsecurity.com/files/156337/SWAPGS-Attack-Proof-Of-Concept.htmlMISC
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200408-01-swapgs-enhttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200408-01-swapgs-enCONFIRM
RHBA-2019:2824https://access.redhat.com/errata/RHBA-2019:2824REDHAT
RHBA-2019:3248https://access.redhat.com/errata/RHBA-2019:3248REDHAT
RHSA-2019:2600https://access.redhat.com/errata/RHSA-2019:2600REDHATThird Party Advisory
RHSA-2019:2609https://access.redhat.com/errata/RHSA-2019:2609REDHAT
RHSA-2019:2695https://access.redhat.com/errata/RHSA-2019:2695REDHAT
RHSA-2019:2696https://access.redhat.com/errata/RHSA-2019:2696REDHAT
RHSA-2019:2730https://access.redhat.com/errata/RHSA-2019:2730REDHAT
RHSA-2019:2899https://access.redhat.com/errata/RHSA-2019:2899REDHAT
RHSA-2019:2900https://access.redhat.com/errata/RHSA-2019:2900REDHAT
RHSA-2019:2975https://access.redhat.com/errata/RHSA-2019:2975REDHAT
RHSA-2019:3011https://access.redhat.com/errata/RHSA-2019:3011REDHAT
RHSA-2019:3220https://access.redhat.com/errata/RHSA-2019:3220REDHAT
https://kc.mcafee.com/corporate/index?page=content&id=SB10297https://kc.mcafee.com/corporate/index?page=content&id=SB10297CONFIRM
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1125https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1125MISCPatch Vendor Advisory
https://www.synology.com/security/advisory/Synology_SA_19_32https://www.synology.com/security/advisory/Synology_SA_19_32CONFIRM