TROYANOSYVIRUS
Back to CVEs

CVE-2022-37019

MEDIUM
6.8

Description

Potential vulnerabilities have been identified in the system BIOS for certain HP PC products which may allow escalation of privileges and code execution. HP is releasing firmware updates to mitigate the potential vulnerabilities.

CVE Details

CVSS v3.1 Score6.8
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/10/2024
Last Modified1/14/2026
Sourcenvd
Honeypot Sightings0

Affected Products

hp:elite_slicehp:elite_slice_firmwarehp:elite_slice_for_meeting_roomshp:elite_slice_for_meeting_rooms_firmwarehp:elitebook_1040_g3hp:elitebook_1040_g3_firmwarehp:elitebook_820_g3hp:elitebook_820_g3_firmwarehp:elitebook_828_g3hp:elitebook_828_g3_firmwarehp:elitebook_840_g3hp:elitebook_840_g3_firmwarehp:elitebook_848_g3hp:elitebook_848_g3_firmwarehp:elitebook_850_g3hp:elitebook_850_g3_firmwarehp:elitebook_folio_g1hp:elitebook_folio_g1_firmwarehp:elitedesk_800_35w_g2_desktop_mini_pchp:elitedesk_800_35w_g2_desktop_mini_pc_firmwarehp:elitedesk_800_65w_g2_desktop_mini_pchp:elitedesk_800_65w_g2_desktop_mini_pc_firmwarehp:mp9_g2_retail_systemhp:mp9_g2_retail_system_firmwarehp:probook_440_g3hp:probook_440_g3_firmwarehp:probook_446_g3hp:probook_446_g3_firmwarehp:probook_470_g3hp:probook_470_g3_firmwarehp:probook_640_g2hp:probook_640_g2_firmwarehp:probook_650_g2hp:probook_650_g2_firmwarehp:rp9_g1_retail_systemhp:rp9_g1_retail_system_firmwarehp:z238_microtower_workstationhp:z238_microtower_workstation_firmwarehp:z240_small_form_factor_workstationhp:z240_small_form_factor_workstation_firmwarehp:z240_tower_workstationhp:z240_tower_workstation_firmwarehp:z2_mini_g3_workstationhp:z2_mini_g3_workstation_firmwarehp:zbook_15_g3hp:zbook_15_g3_firmwarehp:zbook_15u_g3hp:zbook_15u_g3_firmwarehp:zbook_17_g3hp:zbook_17_g3_firmwarehp:zbook_studio_g3hp:zbook_studio_g3_firmware

Weaknesses (CWE)

CWE-269

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.