Got it

IMPACT OF SELF-ENCRYPTING DRIVE VULNERABILITIES (CVE-2018-12037 AND CVE-2018-12038) ON HUAWEI SERVER, HUAWEI STORAGE, NETWORKING, AND HUAWEI CLIENTS

Latest reply: Apr 16, 2022 01:56:42 474 40 32 0 0

 

Impact of Self-Encrypting Drive Vulnerabilities (CVE-2018-12037 and CVE-2018-12038) on Huawei Server, Huawei Storage, Networking, and Huawei Clients

 

Introdution: HUAWEI is aware of reported vulnerabilities in the hardware encryption of certain self-encrypting solid state drives. HUAWEI investigated the impact of these vulnerabilities on all Huawei products. HUAWEI Server, HUAWEI Storage and Networking products do not ship with the affected drives and are therefore not affected by these vulnerabilities. HUAWEI has determined that some HUAWEI client models ship with the affected units (Tohisba, Samsung, SK Hynix, LiteOn, Micron).


Summary: HUAWEI response to reported vulnerabilities in hardware encryption of certain self-encrypting solid state drives as described in Vulnerability Note VU#395981. For information about affected HUAWEI Client models, see this guide.

 

Symptoms: CVE-2018-12037 e CVE-2018-12038

Description I: CVE-2018-12037

There is no cryptographic relation between the password provided by the end user and the key used for the encryption of user data. This can allow an attacker to access the key without knowing the password provided by the end user, allowing the attacker to decrypt information encrypted with that key.



According to National Cyber Security Centre - The Netherlands (NCSC-NL), the following products are affected by CVE-2018-12037:

  • Crucial (Micron) MX100, MX200 and MX300 drives

  • Samsung T3 and T5 portable drives

  • Samsung 840 EVO and 850 EVO drives (In "ATA high" mode these devices are vulnerable, In "TCG" or "ATA max" mode these devices are NOT      vulnerable.)


 Description I: CVE-2018-12038

Key information is stored within a wear-leveled storage chip. Wear-leveling does not guarantee that an old copy of updated data is fully removed. If the updated data is written to a new segment, old versions of data may exist in the previous segment for some time after it has been updated (until that previous segment is overwritten). This means that if a key is updated with a new password, the previous version of the key (either unprotected, or with an old password) could be accessible, negating the need to know the updated password.


According to NCSC-NL, the following products are affected by CVE-2018-12038:

  • Samsung      840 EVO drives


Other products were not reported to have been tested, and similar vulnerabilities may be found in those products.


Impact

These vulnerabilities allow for full recovery of the data without knowledge of any secret, when the attacker has physical access to the drive.

 

Solution

Apply patches

Vendors have issued patches to address the vulnerabilities. See the Vendor pages below for additional information.

If patches are not able to be deployed, consider the following workarounds:

Do not use drive-based encryption;

Use software-based encryption rather than the hardware-based encryption provided by self-encrypting drives.

 

Additional Information:

According to NCSC-NL, BitLocker as bundled with Microsoft Windows relies on hardware full-disk encryption by default if the drive indicates that it can support this.

To determine whether BitLocker is using hardware-based encryption or software-based encryption:

Run "manage-bde.exe -status" in an administrator command prompt.

If the "Encryption Method" starts with "Hardware Encryption", then BitLocker is using the self-encrypting disk's hardware-based encryption implementation.

If the "Encryption Method" states something other than "Hardware Encryption", such as "AES-128" or "XTS AES-256", then BitLocker is using software-based encryption.

BitLocker's default encryption method can be controlled with Group Policy settings. Configure these settings to force BitLocker to use software-based encryption by default. Once these policy settings have been changed, BitLocker needs to be disabled and re-enabled to re-encrypt the drive with software-based encryption (if not already using software-based encryption).


Group policy links to control hardware-based BitLocker encryption:


Conclusion: For an affected drive describes workarounds that can be applied. For customers using Huawei's self-encrypting drive management solution.

I already wish you good reading, in this my second article in a month that in my country is dedicated to women's month.

 

I now sign and take responsibility for the information: Luciano Nhantumbo.


very well described LucianoNhantumbo
View more
  • x
  • convention:

LucianoNhantumbo
LucianoNhantumbo Created 4 days ago (0) (0)
ThankS.@Mahedi  
Keep up the good work
View more
  • x
  • convention:

Interesting content
View more
  • x
  • convention:

Good work, keep it up
View more
  • x
  • convention:

Good work
View more
  • x
  • convention:

Keep it up!
View more
  • x
  • convention:

Thanks for sharing! My frined!
View more
  • x
  • convention:

Well done
View more
  • x
  • convention:

LucianoNhantumbo
LucianoNhantumbo Created 4 days ago (0) (0)
Thanks...  
Hi mate, you shared highly recommended matters.
View more
  • x
  • convention:

LucianoNhantumbo
LucianoNhantumbo Created 4 days ago (1) (0)
Thanks.  
zaheernew
zaheernew Reply LucianoNhantumbo  Created 4 days ago (1) (0)
 

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.