Risk | Low |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2024-21829 CVE-2024-21781 CVE-2023-43753 CVE-2024-23599 |
CWE-ID | CWE-20 CWE-755 CWE-362 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
HPE SimpliVity 380 Gen10 H Hardware solutions / Firmware HPE SimpliVity 380 Gen10 G Hardware solutions / Firmware HPE SimpliVity 380 Gen10 Hardware solutions / Firmware HPE SimpliVity 190r Gen10 Server Hardware solutions / Firmware HPE SimpliVity 170r Gen10 Server Hardware solutions / Firmware HPE SimpliVity 380 Gen10 Plus Hardware solutions / Firmware HPE SimpliVity 380 Gen11 Hardware solutions / Firmware |
Vendor | HPE |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU97437
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-21829
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient input validation in UEFI firmware error handler. A local privileged user can execute arbitrary code with elevated privileges.
Install update from vendor's website.
Vulnerable software versionsHPE SimpliVity 380 Gen10 H: before 2024_1129
HPE SimpliVity 380 Gen10 G: before 2024_1129
HPE SimpliVity 380 Gen10: before 2024_1129
HPE SimpliVity 190r Gen10 Server: before 2024_1129
HPE SimpliVity 170r Gen10 Server: before 2024_1129
HPE SimpliVity 380 Gen10 Plus: before 2024_1129
HPE SimpliVity 380 Gen11: before 2024_1129
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04753en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97438
Risk: Low
CVSSv4.0: 1.8 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-21781
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient input validation in UEFI firmware. A local privileged user can gain access to sensitive information or perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsHPE SimpliVity 380 Gen10 H: before 2024_1129
HPE SimpliVity 380 Gen10 G: before 2024_1129
HPE SimpliVity 380 Gen10: before 2024_1129
HPE SimpliVity 190r Gen10 Server: before 2024_1129
HPE SimpliVity 170r Gen10 Server: before 2024_1129
HPE SimpliVity 380 Gen10 Plus: before 2024_1129
HPE SimpliVity 380 Gen11: before 2024_1129
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04753en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97443
Risk: Low
CVSSv4.0: 1.8 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-43753
CWE-ID:
CWE-755 - Improper Handling of Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to improper handling of errors in Intel Processors with Intel Software Guard Extensions. A local user can gain access to sensitive information.
Install update from vendor's website.
Vulnerable software versionsHPE SimpliVity 380 Gen10 H: before 2024_1129
HPE SimpliVity 380 Gen10 G: before 2024_1129
HPE SimpliVity 380 Gen10: before 2024_1129
HPE SimpliVity 190r Gen10 Server: before 2024_1129
HPE SimpliVity 170r Gen10 Server: before 2024_1129
HPE SimpliVity 380 Gen10 Plus: before 2024_1129
HPE SimpliVity 380 Gen11: before 2024_1129
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04753en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97445
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-23599
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition in Seamless Firmware Updates for some Intel reference platforms. A local user can exploit the race and perform a denial of service (DoS) attack.
Install update from vendor's website.
Vulnerable software versionsHPE SimpliVity 380 Gen10 H: before 2024_1129
HPE SimpliVity 380 Gen10 G: before 2024_1129
HPE SimpliVity 380 Gen10: before 2024_1129
HPE SimpliVity 190r Gen10 Server: before 2024_1129
HPE SimpliVity 170r Gen10 Server: before 2024_1129
HPE SimpliVity 380 Gen10 Plus: before 2024_1129
HPE SimpliVity 380 Gen11: before 2024_1129
CPE2.3https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04753en_us
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.