Print | Rate this content

HPESBHF03933 rev.4 - HPE Products using certain Intel Processors, Microarchitectural Data Sampling (MDS) Side Channel Vulnerabilities, Local Disclosure of Information

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03933en_us

Version: 1

HPESBHF03933 rev.4 - HPE Products using certain Intel Processors, Microarchitectural Data Sampling (MDS) Side Channel Vulnerabilities, Local Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2019-05-14

Last Updated: 2019-05-16


Potential Security Impact: Local: Disclosure of Information

Source: Hewlett Packard Enterprise, HPE Product Security Response Team

VULNERABILITY SUMMARY

On May 14 2019, Intel and other industry partners shared information about a new group of vulnerabilities collectively called Microarchitectural Data Sampling (MDS). These security vulnerabilities in CPUs may allow information disclosure. Intel is releasing Microcode Updates (MCU) to mitigate these vulnerabilities. These updates are coupled with corresponding updates to operating system and hypervisor software. More details are available through references provided for each CVE: CVE-2018-12126 Non-HPE site , CVE-2018-12127 Non-HPE site , CVE-2018-12130 Non-HPE site , and CVE-2019-11091 Non-HPE site

For a complete high-level overview of the Intel Side Channel Microarchitectural Data Sampling vulnerability, please see the information at the following link:

For more detailed information, please see the Intel Security Advisory Microarchitectural Data Sampling (MDS):

This bulletin addresses the following issues as Intel has described them:

  • Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. CVE-2018-12126 (Fallout)

  • Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. CVE-2018-12127 (RIDL)

  • Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. CVE-2018-12130 (Zombieload, RIDL)

  • Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. CVE-2019-11091 (RIDL)

Note: For other Intel-related processor vulnerabilities disclosed at the same time in the Intel 2019 Q1 QSR, please see the following Intel Security Advisories and corresponding HPE security bulletins:

References:
  • CVE-2018-12126 - Also so known as Fallout, MSBDS
  • CVE-2018-12127 - Also known as RIDL, MLPDS
  • CVE-2018-12130 - Also known as Zombieload, RIDL, MFBDS
  • CVE-2019-11091 - Also known as RIDL, MDSUM

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  • HPE ProLiant DL360 Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant DL380 Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant DL160 Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant DL180 Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant DL560 Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant DL580 Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant ML350 Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant ML110 Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant BL460c Gen10 Server Blade Firmware prior to 2.04 04/18/2019
  • HPE Synergy 480 Gen10 Compute Module Firmware prior to 2.04 04/18/2019
  • HPE Synergy 660 Gen10 Compute Module Firmware prior to 2.04 04/18/2019
  • HPE ProLiant XL170r Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant XL190r Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant XL230k Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE Apollo 4200 Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant XL450 Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant XL270d Gen10 Server Firmware prior to 2.04 04/18/2019
  • HPE ProLiant DL120 Gen10 Server Firmware prior to 1.52 4/18/2019
  • HPE ProLiant DL20 Gen10 Server Firmware prior to 1.22 4/4/19
  • HPE ProLiant ML30 Gen10 Server Firmware prior to 1.22 4/4/19
  • HPE ProLiant DL360 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant DL380 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant DL560 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant DL580 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant DL580 Gen9 Special Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant DL160 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant DL180 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant DL120 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant DL60 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant DL80 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant ML110 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant ML150 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant ML350 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant XL230a Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant XL250a Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant XL170r Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant XL190r Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant XL730f Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant XL450 Gen9 Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant XL270d Gen9 Special Server Firmware prior to 2.72 03/25/19
  • HPE ProLiant BL460c Gen9 Server Blade Firmware prior to 2.72 03/25/19
  • HPE Synergy 480 Gen9 Compute Module Firmware prior to 2.72 03/25/19
  • HPE Synergy 620 Gen9 Compute Module Firmware prior to 2.72 03/25/19
  • HPE Synergy 660 Gen9 Compute Module Firmware prior to 2.72 03/25/19
  • HPE Synergy 680 Gen9 Compute Module Firmware prior to 2.72 03/25/19
  • HPE ProLiant DL20 Gen9 Server Firmware prior to 2.82 4/4/19
  • HPE ProLiant ML30 Gen9 Server Firmware prior to 2.82 4/4/19
  • HPE ProLiant BL420c Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant BL460c Gen8 Server Blade Firmware prior to 5/24/19
  • HPE ProLiant BL660c Gen8 Server Blade Firmware prior to 5/24/19
  • HPE ProLiant ML350e Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant ML350e Gen8 v2 Server Firmware prior to 5/24/19
  • HPE ProLiant DL160 Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant DL380p Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant DL360p Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant ML350p Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant DL360e Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant DL380e Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant SL4540 Gen8 1 Node Server Firmware prior to 5/24/19
  • HPE ProLiant DL580 Gen8 Server Firmware prior to V2.22 6/3/19
  • HPE ProLiant SL210t Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant DL560 Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant SL270s Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant SL250s Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant SL230s Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant SL140s Gen8 Server Firmware prior to 5/24/19
  • HPE ProLiant XL220a Gen8 v2 Server Firmware prior to 2019.04.04(12 Jun 2019)
  • HPE ProLiant DL320e Gen8 v2 Server Firmware prior to 2019.04.04(12 Jun 2019)
  • HPE ProLiant ML310e Gen8 Server Firmware prior to 2019.04.04(12 Jun 2019)
  • HPE ProLiant ML310e Gen8 v2 Server Firmware prior to 2019.04.04(12 Jun 2019)
  • HPE ProLiant MicroServer Gen8 Firmware prior to 2019.04.04(12 Jun 2019)
  • HPE ProLiant DL320e Gen8 Server Firmware prior to 2019.04.04(12 Jun 2019)
  • HPE ProLiant DL120 G7 Server Firmware prior to 2019.04.04(12 Jun 2019)
  • HPE ProLiant ML110 G7 Server Firmware prior to 2019.04.04(12 Jun 2019)
  • HPE Storage File Controllers HPE Storage File Controller and Storage Performance File Controller - Update to latest DL360 Gen10 System ROM for your hardware
  • HPE StoreEasy 3000 Gateway Storage 3830, 3840, 3850 - Update to latest Gen9 System ROM for your hardware (DL380, BL460C)
  • HPE StoreVirtual 3000 File Controller HPE StoreVirtual 3000 File Controller - Update to latest DL120 Gen9 System ROM
  • HPE 3PAR StoreServ File Controller HPE 3PAR StoreServ File Controller - Update to latest Apollo XL190r Gen9 System ROM
  • HPE StoreEasy 1000 Storage Gen10 1460, 1560, 1660, 1660 Performance, 1860, 1860 Performance - Update to latest Gen10 System ROM for your hardware (DL380, DL360, ML110)
  • HPE StoreEasy 1000 Storage Gen9 1430, 1440, 1530, 1540, 1630,1640, 1640 Expanded, 1830, 1840 - Update to latest Gen9 System ROM for your hardware (DL380, DL360, ML110,Apollo 4200)

BACKGROUND

CVSS Version 3.0 and Version 2.0 Base Metrics
Reference
V3 Vector
V3 Base Score
V2 Vector
V2 Base Score
CVE-2018-12126
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.3
(AV:L/AC:L/Au:N/C:C/I:N/A:N)
4.9
CVE-2018-12127
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.3
(AV:L/AC:L/Au:N/C:C/I:N/A:N)
4.9
CVE-2018-12130
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.3
(AV:L/AC:L/Au:N/C:C/I:N/A:N)
4.9
CVE-2019-11091
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
3.6
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
2.1
Information on CVSS is documented in HPE Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided updated firmware to address these vulnerabilities.

The impacted product versions table above indicates the minimum firmware version, coupled with operating system vendor updates, that are required to resolve these vulnerabilities.

Please visit HPE Support Center to download the latest firmware for your product.

  • Note: These updates are coupled with corresponding updates to operating system and hypervisor software. You must apply operating system or hypervisor updates to complete the mitigation.
HISTORY
  • Version:1 (rev.1) - 16 May 2019 Initial release
  • Version:2 (rev.2) - 5 June 2019 Added links to Intel Security Advisories
  • Version:3 (rev.3) - 14 June 2019 Added ProLiant Gen8 ROM Versions
  • Version:4 (rev.4) - 14 June 2019 Added StoreServ, StoreEasy, and StoreVirtual Products

Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.

Report: To report a potential security vulnerability for any HPE supported product:

Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

©Copyright 2019 Hewlett Packard Enterprise Development LP
Hewlett Packard Enterprise Development shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HPE nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise Development and the names of Hewlett Packard Enterprise Development products referenced herein are trademarks of Hewlett Packard Enterprise Development in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.

Provide feedback

Please rate the information on this page to help us improve our content. Thank you!
Document title: HPESBHF03933 rev.4 - HPE Products using certain Intel Processors, Microarchitectural Data Sampling (MDS) Side Channel Vulnerabilities, Local Disclosure of Information
Document ID: emr_na-hpesbhf03933en_us-5
How helpful was this document?
How can we improve this document?
Note: Only English language comments can be accepted at this time.
Please wait while we process your request.