Risk | High |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2022-26845 CVE-2022-27497 CVE-2022-29893 CVE-2021-33159 CVE-2022-29466 CVE-2022-29515 |
CWE-ID | CWE-287 CWE-476 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
HPE ProLiant DL20 Gen9 Server SPS Hardware solutions / Firmware HPE ProLiant ML30 Gen9 Server SPS Hardware solutions / Firmware HPE ProLiant MicroServer Gen10 Plus Hardware solutions / Firmware HPE ProLiant DL20 Gen10 Plus server Hardware solutions / Firmware HPE ProLiant ML30 Gen10 Plus server Hardware solutions / Firmware |
Vendor | HPE |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU69312
Risk: High
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-26845
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests in firmware. A remote attacker can bypass authentication process and gain elevated privileges on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsHPE ProLiant DL20 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant ML30 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant MicroServer Gen10 Plus: before SPS_E3_06.00.03.204.0
HPE ProLiant DL20 Gen10 Plus server: before SPS_E3_06.00.03.204.0
HPE ProLiant ML30 Gen10 Plus server: before SPS_E3_06.00.03.204.0
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04377en_us
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69315
Risk: High
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-27497
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in firmware. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsHPE ProLiant DL20 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant ML30 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant MicroServer Gen10 Plus: before SPS_E3_06.00.03.204.0
HPE ProLiant DL20 Gen10 Plus server: before SPS_E3_06.00.03.204.0
HPE ProLiant ML30 Gen10 Plus server: before SPS_E3_06.00.03.204.0
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04377en_us
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69313
Risk: Medium
CVSSv4.0: 6.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-29893
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests in firmware. A remote user can bypass authentication process and gain elevated privileges on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsHPE ProLiant DL20 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant ML30 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant MicroServer Gen10 Plus: before SPS_E3_06.00.03.204.0
HPE ProLiant DL20 Gen10 Plus server: before SPS_E3_06.00.03.204.0
HPE ProLiant ML30 Gen10 Plus server: before SPS_E3_06.00.03.204.0
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04377en_us
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69314
Risk: Low
CVSSv4.0: 1.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-33159
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests in firmware. A local administrator can bypass authentication process and gain elevated privileges on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsHPE ProLiant DL20 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant ML30 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant MicroServer Gen10 Plus: before SPS_E3_06.00.03.204.0
HPE ProLiant DL20 Gen10 Plus server: before SPS_E3_06.00.03.204.0
HPE ProLiant ML30 Gen10 Plus server: before SPS_E3_06.00.03.204.0
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04377en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69316
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-29466
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in firmware. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsHPE ProLiant DL20 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant ML30 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant MicroServer Gen10 Plus: before SPS_E3_06.00.03.204.0
HPE ProLiant DL20 Gen10 Plus server: before SPS_E3_06.00.03.204.0
HPE ProLiant ML30 Gen10 Plus server: before SPS_E3_06.00.03.204.0
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04377en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69317
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-29515
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to missing release of memory after effective lifetime in firmware. A local administrator can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsHPE ProLiant DL20 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant ML30 Gen9 Server SPS: before SPS_E3_04.01.04.700.0
HPE ProLiant MicroServer Gen10 Plus: before SPS_E3_06.00.03.204.0
HPE ProLiant DL20 Gen10 Plus server: before SPS_E3_06.00.03.204.0
HPE ProLiant ML30 Gen10 Plus server: before SPS_E3_06.00.03.204.0
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04377en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.