CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
-
On April 24, 2018, researchers disclosed a vulnerability that takes advantage of a buffer overflow vulnerability in NVIDIA TX1 BootROM when Recovery Mode (RCM) is active. This vulnerability could allow an unprivileged, local attacker to bypass secure boot and execute unverified code on an affected system.
The vulnerability has been identified by CVE-2018-6242.
To exploit this vulnerability, an attacker must be able to physically access the device along with the affected processor’s USB connection. This vulnerability cannot be exploited remotely, even if the device is connected to the Internet.
Cisco has identified all products that use the NVIDIA TX1 processor and has released software updates to address this vulnerability. The software update will permanently disable the ability to activate RCM. Should customers attempt to downgrade their software version, the ability to activate RCM will no longer be available.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nvidia-tx1-rom
-
Cisco has investigated its product line to determine which products may be affected by this vulnerability.
Any product not listed in the Vulnerable Products section of this advisory is to be considered not vulnerable.
Vulnerable Products
The following table lists Cisco products that are affected by the vulnerability described in this advisory:
Product Cisco Bug ID Fixed Release Availability Collaboration Endpoints Cisco WebEx Room 55 CSCvj27020 CE9.2.6 (Available)
CE9.3.2 (Available)Cisco WebEx Room 70 Single/Dual CSCvj27020 CE9.2.6 (Available)
CE9.3.2 (Available)Cisco WebEx Room Kit CSCvj27020 CE9.2.6 (Available)
CE9.3.2 (Available)Cisco WebEx Room Kit Plus CSCvj27020 CE9.2.6 (Available)
CE9.3.2 (Available)Cloud-Based Deployments RoomOS CSCvj27020 RoomOS 2018-06-01 608dcdbb6e1 Note: Collaboration Endpoints are installed on-premises for customer deployments. RoomOS is an alternate software offering for the same products, but via cloud-based deployments (e.g., Cisco WebEx cloud subscriptions). Cisco controls the push of the software to these units, which have either already received the patch via software updates, or will receive the update the next time the device is powered on and online.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability.
No other Cisco products are currently known to be affected by this vulnerability.
-
There are no workarounds that address this vulnerability.
-
For information about fixed software releases, see the Vulnerable Products section of this advisory
When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page, to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
-
The vulnerability described in this advisory was discussed in several articles and discussion forums as of April 24, 2018.
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerability that is described in this advisory.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
Version Description Section Status Date 1.0 Initial public release. — Final 2018-June-20
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.