The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade DMTF/libspdm
to version 2.3.2 or higher.
Affected versions of this package are vulnerable to Incomplete Internal State Distinction such that if a device supports both DHE session and PSK session with mutual authentication, the attacker may be able to establish the session with KEY_EXCHANGE
and PSK_FINISH
to bypass the mutual authentication.
Note:
This issue only impacts the SPDM responder, which supports KEY_EX_CAP=1 and
PSK_CAP=10bat same time with mutual authentication requirement. The SPDM requester is not impacted. The SPDM responder is not impacted if
KEY_EX_CAP=0or
PSK_CAP=0or
PSK_CAP=01b`. The SPDM responder is not impacted if mutual authentication is not required. The SPDM specification (DSP0274) does not contain this vulnerability.