Support Center > 详细页 > 安全公告详细

Security Advisory - Security updates related to LogoFAIL and other vulnerabilities in some products of KAYTUS

  • SA No KAYTUS-SA-2024-001
  • Initial Release Date 2024-04-28 10:58:09
  • last Release Date 2024-10-31 14:47:59
  • Source AMI Security Advisory
  • Potential Security Impact Arbitrary Code Execution or DOS
Vulnerability Summary

LogoFail:The BMP, GIF, JPEG, PCX, and TGA parsing inventory contained in the BIOS UEFI system firmware is vulnerable. These libraries are used to parse personalized boot logo images loaded from EFI system partitions, which may cause local attackers with elevated privileges to trigger a denial of service or arbitrary code execution, involving multiple CVEs (CVE-2023-39538, CVE-2023-39539)
CVE-2023-52080:KAYTUS server UEFI firmware through 8.4 has a pool overflow vulnerability, caused by improper use of the gRT->GetVariable() function. Attackers with access to local NVRAM variables can exploit  this by modifying these variables on SPI Flash, resulting in memory  data being tampered with. When critical data in memory data is tampered with,a crash may occur.

Vulnerability Scoring Details
CVE V3.1 Vector(Base) Base Score V3.1 Vector(Temporal Score) Temporal Score
CVE-2023-39538 AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H 7.5 E:P/RL:O/RC:C 6.7
CVE-2023-39539 AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H 7.5 E:P/RL:O/RC:C 6.7
CVE-2023-52080 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H 5.5 E:P/RL:O/RC:C 5.0

Fixed Product Version
Products FW UpdateVersion
NF5180A6 NF5180A6_BIOS_4.04.02
NF5280R6 NF5280R6_BIOS_05.01.28
NF8260M6 NF8260M6_BIOS_08.05.00
NF5280M6 NF5280M6_BIOS_08.05.00
NF8480M6 NF8480M6_BIOS_08.05.00
NF5180M6 NF5180M6_BIOS_08.05.00
NF5466M6 NF5466M6_BIOS_08.05.00
NF5266M6 NF5266M6_BIOS_08.05.00
NF5468M6 NF5468M6_BIOS_08.05.00
i48M6 NS548xM6_BIOS_08.04.00
i24M6/i24LM6 NS5160M6_BIOS_08.04.00
NF5260M6 NF5260M6_BIOS_08.05.01
NF5270M6 NF5270M6_BIOS_08.05.01
NF5688M6 NF5688M6_BIOS_08.05.01
NF5488M6 NF5488M6_BIOS_08.05.01
NF5280M5 NF5280M5_BIOS_4.1.30

Resolution

Please visit the support center directly to obtain patches and related technical support.

Revision History

2024-04-28 V1.0 INITIAL

References
Support

For issues about implementing the recommendations of this Security Bulletin, contact normal KAYTUS Services Support channel. For other issues about the content of this Security Bulletin, send e-mail to sec@kaytus.com.

Report

To report a potential security vulnerability for KAYTUS product: Reporting a Security Vulnerability

Declaration

KAYTUS shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, KAYTUS disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement. In no event shall KAYTUS or any of its directly or indirectly controlled subsidiaries or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. Your use of the document, by whatsoever means, will be totally at your own risk. KAYTUS is entitled to amend or update this document from time to time.