TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2022-37019

MEDIUM
6.8

Beschreibung

Potential vulnerabilities have been identified in the system BIOS for certain HP PC products which may allow escalation of privileges and code execution. HP is releasing firmware updates to mitigate the potential vulnerabilities.

CVE Details

CVSS v3.1 Bewertung6.8
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht6/10/2024
Zuletzt geandert1/14/2026
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

hp:elite_slicehp:elite_slice_firmwarehp:elite_slice_for_meeting_roomshp:elite_slice_for_meeting_rooms_firmwarehp:elitebook_1040_g3hp:elitebook_1040_g3_firmwarehp:elitebook_820_g3hp:elitebook_820_g3_firmwarehp:elitebook_828_g3hp:elitebook_828_g3_firmwarehp:elitebook_840_g3hp:elitebook_840_g3_firmwarehp:elitebook_848_g3hp:elitebook_848_g3_firmwarehp:elitebook_850_g3hp:elitebook_850_g3_firmwarehp:elitebook_folio_g1hp:elitebook_folio_g1_firmwarehp:elitedesk_800_35w_g2_desktop_mini_pchp:elitedesk_800_35w_g2_desktop_mini_pc_firmwarehp:elitedesk_800_65w_g2_desktop_mini_pchp:elitedesk_800_65w_g2_desktop_mini_pc_firmwarehp:mp9_g2_retail_systemhp:mp9_g2_retail_system_firmwarehp:probook_440_g3hp:probook_440_g3_firmwarehp:probook_446_g3hp:probook_446_g3_firmwarehp:probook_470_g3hp:probook_470_g3_firmwarehp:probook_640_g2hp:probook_640_g2_firmwarehp:probook_650_g2hp:probook_650_g2_firmwarehp:rp9_g1_retail_systemhp:rp9_g1_retail_system_firmwarehp:z238_microtower_workstationhp:z238_microtower_workstation_firmwarehp:z240_small_form_factor_workstationhp:z240_small_form_factor_workstation_firmwarehp:z240_tower_workstationhp:z240_tower_workstation_firmwarehp:z2_mini_g3_workstationhp:z2_mini_g3_workstation_firmwarehp:zbook_15_g3hp:zbook_15_g3_firmwarehp:zbook_15u_g3hp:zbook_15u_g3_firmwarehp:zbook_17_g3hp:zbook_17_g3_firmwarehp:zbook_studio_g3hp:zbook_studio_g3_firmware

Schwachen (CWE)

CWE-269

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.