CVE-2019-18279

In Phoenix SCT WinFlash 1.1.12.0 through 1.5.74.0, the included drivers could be used by a malicious Windows application to gain elevated privileges. Adverse impacts are limited to the Windows environment and there is no known direct impact to the UEFI firmware. This was fixed in late June 2019.
Configurations

Configuration 1 (hide)

cpe:2.3:o:phoenix:securecore_technology:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:32

Type Values Removed Values Added
References () https://eclypsium.com/2019/08/10/screwed-drivers-signed-sealed-delivered/ - Third Party Advisory () https://eclypsium.com/2019/08/10/screwed-drivers-signed-sealed-delivered/ - Third Party Advisory
References () https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf - Third Party Advisory () https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf - Third Party Advisory
References () https://www.phoenix.com/content/uploads/Security-Newsletter-September-2019.pdf - Vendor Advisory () https://www.phoenix.com/content/uploads/Security-Newsletter-September-2019.pdf - Vendor Advisory

Information

Published : 2019-11-13 18:15

Updated : 2024-11-21 04:32


NVD link : CVE-2019-18279

Mitre link : CVE-2019-18279

CVE.ORG link : CVE-2019-18279


JSON object : View

Products Affected

phoenix

  • securecore_technology