TROYANOSYVIRUS
Voltar para CVEs

CVE-2022-37019

MEDIUM
6.8

Descricao

Potential vulnerabilities have been identified in the system BIOS for certain HP PC products which may allow escalation of privileges and code execution. HP is releasing firmware updates to mitigate the potential vulnerabilities.

Detalhes CVE

Pontuacao CVSS v3.16.8
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado6/10/2024
Ultima modificacao1/14/2026
Fontenvd
Avistamentos honeypot0

Produtos afetados

hp:elite_slicehp:elite_slice_firmwarehp:elite_slice_for_meeting_roomshp:elite_slice_for_meeting_rooms_firmwarehp:elitebook_1040_g3hp:elitebook_1040_g3_firmwarehp:elitebook_820_g3hp:elitebook_820_g3_firmwarehp:elitebook_828_g3hp:elitebook_828_g3_firmwarehp:elitebook_840_g3hp:elitebook_840_g3_firmwarehp:elitebook_848_g3hp:elitebook_848_g3_firmwarehp:elitebook_850_g3hp:elitebook_850_g3_firmwarehp:elitebook_folio_g1hp:elitebook_folio_g1_firmwarehp:elitedesk_800_35w_g2_desktop_mini_pchp:elitedesk_800_35w_g2_desktop_mini_pc_firmwarehp:elitedesk_800_65w_g2_desktop_mini_pchp:elitedesk_800_65w_g2_desktop_mini_pc_firmwarehp:mp9_g2_retail_systemhp:mp9_g2_retail_system_firmwarehp:probook_440_g3hp:probook_440_g3_firmwarehp:probook_446_g3hp:probook_446_g3_firmwarehp:probook_470_g3hp:probook_470_g3_firmwarehp:probook_640_g2hp:probook_640_g2_firmwarehp:probook_650_g2hp:probook_650_g2_firmwarehp:rp9_g1_retail_systemhp:rp9_g1_retail_system_firmwarehp:z238_microtower_workstationhp:z238_microtower_workstation_firmwarehp:z240_small_form_factor_workstationhp:z240_small_form_factor_workstation_firmwarehp:z240_tower_workstationhp:z240_tower_workstation_firmwarehp:z2_mini_g3_workstationhp:z2_mini_g3_workstation_firmwarehp:zbook_15_g3hp:zbook_15_g3_firmwarehp:zbook_15u_g3hp:zbook_15u_g3_firmwarehp:zbook_17_g3hp:zbook_17_g3_firmwarehp:zbook_studio_g3hp:zbook_studio_g3_firmware

Fraquezas (CWE)

CWE-269

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.