Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-36794 CVE-2022-36348 |
CWE-ID | CWE-755 CWE-749 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
HPE ProLiant MicroServer Gen10 Plus Hardware solutions / Firmware HPE ProLiant DL20 Gen10 Plus server Hardware solutions / Firmware HPE ProLiant ML30 Gen10 Plus server Hardware solutions / Firmware HPE ProLiant DL110 Gen10 Plus Telco server Hardware solutions / Firmware HPE ProLiant DL380 Gen10 Plus server Hardware solutions / Firmware HPE ProLiant DL360 Gen10 Plus server Hardware solutions / Firmware |
Vendor | HPE |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU72465
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-36794
CWE-ID:
CWE-755 - Improper Handling of Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper handling of errors. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsHPE ProLiant MicroServer Gen10 Plus: before 06.00.03.309
HPE ProLiant DL20 Gen10 Plus server: before 06.00.03.309
HPE ProLiant ML30 Gen10 Plus server: before 06.00.03.309
HPE ProLiant DL110 Gen10 Plus Telco server: before 04.04.04.300
HPE ProLiant DL380 Gen10 Plus server: before 04.04.04.300
HPE ProLiant DL360 Gen10 Plus server: before 04.04.04.300
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04415en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72464
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-36348
CWE-ID:
CWE-749 - Exposed Dangerous Method or Function
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to usage of active debug code. A local user can execute arbitrary code with elevated privileges.
Install update from vendor's website.
Vulnerable software versionsHPE ProLiant MicroServer Gen10 Plus: before 06.00.03.309
HPE ProLiant DL20 Gen10 Plus server: before 06.00.03.309
HPE ProLiant ML30 Gen10 Plus server: before 06.00.03.309
HPE ProLiant DL110 Gen10 Plus Telco server: before 04.04.04.300
HPE ProLiant DL380 Gen10 Plus server: before 04.04.04.300
HPE ProLiant DL360 Gen10 Plus server: before 04.04.04.300
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04415en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.