An input validation weakness was reported in the TpmSetup module for some legacy System x server products that could allow a local attacker with elevated privileges to read the contents of memory.
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | High |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | None |
Availability Impact | None |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | High |
User Interaction | None |
Vulnerability Complexity | High |
Vulnerability Impact | None |
Epss Score | 0 |
---|---|
Epss Percentile | 0 |
Note: Consider this fact that the EPSS model relies on historical data and real-world exploit information to calculate the probability of exploitation. When a CVE is newly published, there isn't enough data available to determine its likelihood of being exploited. As a result, the EPSS score defaults to 0 until more information becomes available.
لینک | منبع | تگ ها |
---|---|---|
https://support.lenovo.com/us/en/product_security/LEN-193044 |