TROYANOSYVIRUS
Volver a CVEs

CVE-2022-37019

MEDIUM
6.8

Descripcion

Potential vulnerabilities have been identified in the system BIOS for certain HP PC products which may allow escalation of privileges and code execution. HP is releasing firmware updates to mitigate the potential vulnerabilities.

Detalles CVE

Puntuacion CVSS v3.16.8
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/10/2024
Ultima modificacion1/14/2026
Fuentenvd
Avistamientos honeypot0

Productos afectados

hp:elite_slicehp:elite_slice_firmwarehp:elite_slice_for_meeting_roomshp:elite_slice_for_meeting_rooms_firmwarehp:elitebook_1040_g3hp:elitebook_1040_g3_firmwarehp:elitebook_820_g3hp:elitebook_820_g3_firmwarehp:elitebook_828_g3hp:elitebook_828_g3_firmwarehp:elitebook_840_g3hp:elitebook_840_g3_firmwarehp:elitebook_848_g3hp:elitebook_848_g3_firmwarehp:elitebook_850_g3hp:elitebook_850_g3_firmwarehp:elitebook_folio_g1hp:elitebook_folio_g1_firmwarehp:elitedesk_800_35w_g2_desktop_mini_pchp:elitedesk_800_35w_g2_desktop_mini_pc_firmwarehp:elitedesk_800_65w_g2_desktop_mini_pchp:elitedesk_800_65w_g2_desktop_mini_pc_firmwarehp:mp9_g2_retail_systemhp:mp9_g2_retail_system_firmwarehp:probook_440_g3hp:probook_440_g3_firmwarehp:probook_446_g3hp:probook_446_g3_firmwarehp:probook_470_g3hp:probook_470_g3_firmwarehp:probook_640_g2hp:probook_640_g2_firmwarehp:probook_650_g2hp:probook_650_g2_firmwarehp:rp9_g1_retail_systemhp:rp9_g1_retail_system_firmwarehp:z238_microtower_workstationhp:z238_microtower_workstation_firmwarehp:z240_small_form_factor_workstationhp:z240_small_form_factor_workstation_firmwarehp:z240_tower_workstationhp:z240_tower_workstation_firmwarehp:z2_mini_g3_workstationhp:z2_mini_g3_workstation_firmwarehp:zbook_15_g3hp:zbook_15_g3_firmwarehp:zbook_15u_g3hp:zbook_15u_g3_firmwarehp:zbook_17_g3hp:zbook_17_g3_firmwarehp:zbook_studio_g3hp:zbook_studio_g3_firmware

Debilidades (CWE)

CWE-269

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.