HPE SimpliVity servers update for Intel UEFI firmware



Risk Low
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2024-21829
CVE-2024-21781
CVE-2023-43753
CVE-2024-23599
CWE-ID CWE-20
CWE-755
CWE-362
Exploitation vector Local
Public exploit N/A
Vulnerable software
HPE SimpliVity 380 Gen10 H
Hardware solutions / Firmware

HPE SimpliVity 380 Gen10 G
Hardware solutions / Firmware

HPE SimpliVity 380 Gen10
Hardware solutions / Firmware

HPE SimpliVity 190r Gen10 Server
Hardware solutions / Firmware

HPE SimpliVity 170r Gen10 Server
Hardware solutions / Firmware

HPE SimpliVity 380 Gen10 Plus
Hardware solutions / Firmware

HPE SimpliVity 380 Gen11
Hardware solutions / Firmware

Vendor HPE

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU97437

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-21829

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient input validation in UEFI firmware error handler. A local privileged user can execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

HPE SimpliVity 380 Gen10 H: before 2024_1129

HPE SimpliVity 380 Gen10 G: before 2024_1129

HPE SimpliVity 380 Gen10: before 2024_1129

HPE SimpliVity 190r Gen10 Server: before 2024_1129

HPE SimpliVity 170r Gen10 Server: before 2024_1129

HPE SimpliVity 380 Gen10 Plus: before 2024_1129

HPE SimpliVity 380 Gen11: before 2024_1129

CPE2.3 External links

https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04753en_us


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU97438

Risk: Low

CVSSv4.0: 1.8 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-21781

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient input validation in UEFI firmware. A local privileged user can gain access to sensitive information or perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

HPE SimpliVity 380 Gen10 H: before 2024_1129

HPE SimpliVity 380 Gen10 G: before 2024_1129

HPE SimpliVity 380 Gen10: before 2024_1129

HPE SimpliVity 190r Gen10 Server: before 2024_1129

HPE SimpliVity 170r Gen10 Server: before 2024_1129

HPE SimpliVity 380 Gen10 Plus: before 2024_1129

HPE SimpliVity 380 Gen11: before 2024_1129

CPE2.3 External links

https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04753en_us


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper handling of exceptional conditions

EUVDB-ID: #VU97443

Risk: Low

CVSSv4.0: 1.8 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-43753

CWE-ID: CWE-755 - Improper Handling of Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper handling of errors in Intel Processors with Intel Software Guard Extensions. A local user can gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

HPE SimpliVity 380 Gen10 H: before 2024_1129

HPE SimpliVity 380 Gen10 G: before 2024_1129

HPE SimpliVity 380 Gen10: before 2024_1129

HPE SimpliVity 190r Gen10 Server: before 2024_1129

HPE SimpliVity 170r Gen10 Server: before 2024_1129

HPE SimpliVity 380 Gen10 Plus: before 2024_1129

HPE SimpliVity 380 Gen11: before 2024_1129

CPE2.3 External links

https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04753en_us


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Race condition

EUVDB-ID: #VU97445

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-23599

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition in Seamless Firmware Updates for some Intel reference platforms. A local user can exploit the race and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

HPE SimpliVity 380 Gen10 H: before 2024_1129

HPE SimpliVity 380 Gen10 G: before 2024_1129

HPE SimpliVity 380 Gen10: before 2024_1129

HPE SimpliVity 190r Gen10 Server: before 2024_1129

HPE SimpliVity 170r Gen10 Server: before 2024_1129

HPE SimpliVity 380 Gen10 Plus: before 2024_1129

HPE SimpliVity 380 Gen11: before 2024_1129

CPE2.3 External links

https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04753en_us


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###