Risk | Low |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2022-26837 CVE-2021-0187 CVE-2022-32231 CVE-2022-26343 |
CWE-ID | CWE-20 CWE-284 CWE-665 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
HPE ProLiant e910t Server Blade Hardware solutions / Firmware HPE ProLiant e910 Server Blade Hardware solutions / Firmware HPE ProLiant m750 Server Blade Hardware solutions / Firmware HPE ProLiant m710x-L Server Blade Hardware solutions / Firmware HPE ProLiant m710x Server Blade Hardware solutions / Firmware HPE Edgeline e920t Server Blade Hardware solutions / Firmware HPE Edgeline e920d Server Blade Hardware solutions / Firmware HPE Edgeline e920 Server Blade Hardware solutions / Firmware |
Vendor | HPE |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU72452
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-26837
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the BIOS firmware. A local user can execute arbitrary code with elevated privileges.
Install update from vendor's website.
Vulnerable software versionsHPE ProLiant e910t Server Blade: before 2.02_02-09-2023
HPE ProLiant e910 Server Blade: before 2.02_02-09-2023
HPE ProLiant m750 Server Blade: before 1.56_02-02-2023
HPE ProLiant m710x-L Server Blade: before 1.98_02-02-2023
HPE ProLiant m710x Server Blade: before 1.98_02-02-2023
HPE Edgeline e920t Server Blade: before 1.66_02-02-2023
HPE Edgeline e920d Server Blade: before 1.66_02-02-2023
HPE Edgeline e920 Server Blade: before 1.66_02-02-2023
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04409en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72455
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-0187
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper access restrictions in the BIOS firmware. A local user can execute arbitrary code with elevated privileges.
Install update from vendor's website.
Vulnerable software versionsHPE ProLiant e910t Server Blade: before 2.02_02-09-2023
HPE ProLiant e910 Server Blade: before 2.02_02-09-2023
HPE ProLiant m750 Server Blade: before 1.56_02-02-2023
HPE ProLiant m710x-L Server Blade: before 1.98_02-02-2023
HPE ProLiant m710x Server Blade: before 1.98_02-02-2023
HPE Edgeline e920t Server Blade: before 1.66_02-02-2023
HPE Edgeline e920d Server Blade: before 1.66_02-02-2023
HPE Edgeline e920 Server Blade: before 1.66_02-02-2023
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04409en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72451
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-32231
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper initialization in the BIOS firmware. A local user can run a specially crafted application to execute arbitrary code with escalated privileges on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsHPE ProLiant e910t Server Blade: before 2.02_02-09-2023
HPE ProLiant e910 Server Blade: before 2.02_02-09-2023
HPE ProLiant m750 Server Blade: before 1.56_02-02-2023
HPE ProLiant m710x-L Server Blade: before 1.98_02-02-2023
HPE ProLiant m710x Server Blade: before 1.98_02-02-2023
HPE Edgeline e920t Server Blade: before 1.66_02-02-2023
HPE Edgeline e920d Server Blade: before 1.66_02-02-2023
HPE Edgeline e920 Server Blade: before 1.66_02-02-2023
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04409en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72449
Risk: Low
CVSSv4.0: 5.6 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-26343
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper access restrictions in the BIOS firmware. A local privileged user can execute arbitrary code with elevated privileges.
Install update from vendor's website.
Vulnerable software versionsHPE ProLiant e910t Server Blade: before 2.02_02-09-2023
HPE ProLiant e910 Server Blade: before 2.02_02-09-2023
HPE ProLiant m750 Server Blade: before 1.56_02-02-2023
HPE ProLiant m710x-L Server Blade: before 1.98_02-02-2023
HPE ProLiant m710x Server Blade: before 1.98_02-02-2023
HPE Edgeline e920t Server Blade: before 1.66_02-02-2023
HPE Edgeline e920d Server Blade: before 1.66_02-02-2023
HPE Edgeline e920 Server Blade: before 1.66_02-02-2023
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04409en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.