Vulnerabilities > CVE-2020-28368 - Missing Authorization vulnerability in multiple products
Attack vector
LOCAL Attack complexity
LOW Privileges required
HIGH Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- http://www.openwall.com/lists/oss-security/2020/11/26/1
- http://www.openwall.com/lists/oss-security/2020/11/26/1
- http://xenbits.xen.org/xsa/advisory-351.html
- http://xenbits.xen.org/xsa/advisory-351.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5J66QUUHXH2RR4CNCKQRGVXVSOUFRPDA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5J66QUUHXH2RR4CNCKQRGVXVSOUFRPDA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XV23EZIMNLJN4YXRRXLQV2ALW6ZEALXV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XV23EZIMNLJN4YXRRXLQV2ALW6ZEALXV/
- https://platypusattack.com
- https://platypusattack.com
- https://www.debian.org/security/2020/dsa-4804
- https://www.debian.org/security/2020/dsa-4804
- https://www.zdnet.com/article/new-platypus-attack-can-steal-data-from-intel-cpus/
- https://www.zdnet.com/article/new-platypus-attack-can-steal-data-from-intel-cpus/
- https://xenbits.xen.org/xsa/advisory-351.html
- https://xenbits.xen.org/xsa/advisory-351.html