{"api_version":"1","generated_at":"2026-04-22T23:21:59+00:00","cve":"CVE-2018-3989","urls":{"html":"https://cve.report/CVE-2018-3989","api":"https://cve.report/api/cve/CVE-2018-3989.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-3989","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-3989"},"summary":{"title":"CVE-2018-3989","description":"An exploitable kernel memory disclosure vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400).A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to trigger this vulnerability.","state":"PUBLIC","assigner":"talos-cna@cisco.com","published_at":"2019-02-05 23:29:00","updated_at":"2022-04-19 18:15:00"},"problem_types":["CWE-908"],"metrics":[],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"TALOS-2018-0657 ||  Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/107005","name":"107005","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Wibu Systems WibuKey DRM Multiple Input Validation Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-3989","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3989","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"3989","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"3989","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"3989","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"wibu","cpe5":"wibukey","cpe6":"6.40","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"3989","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"wibu","cpe5":"wibukey","cpe6":"6.40","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"talos-cna@cisco.com","ID":"CVE-2018-3989","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An exploitable kernel memory disclosure vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400).A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to trigger this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"107005","refsource":"BID","url":"http://www.securityfocus.com/bid/107005"},{"name":"https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657","refsource":"MISC","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657"},{"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf","refsource":"CONFIRM","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf"},{"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf","refsource":"CONFIRM","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf"}]},"impact":{"cvss":{"baseScore":4.3,"baseSeverity":"Medium","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N","version":"3.0"}}},"nvd":{"publishedDate":"2019-02-05 23:29:00","lastModifiedDate":"2022-04-19 18:15:00","problem_types":["CWE-908"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":2.1},"severity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:wibu:wibukey:6.40:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"3989","Ordinal":"119903","Title":"CVE-2018-3989","CVE":"CVE-2018-3989","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"3989","Ordinal":"1","NoteData":"An exploitable kernel memory disclosure vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400).A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to trigger this vulnerability.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"3989","Ordinal":"2","NoteData":"2019-02-05","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"3989","Ordinal":"3","NoteData":"2019-05-14","Type":"Other","Title":"Modified"}]}}}