fkie_cve-2015-5368
Vulnerability from fkie_nvd
Published
2015-08-27 15:59
Modified
2024-11-21 02:32
Severity ?
Summary
The HP lt4112 LTE/HSPA+ Gobi 4G module with firmware before 12.500.00.15.1803 on EliteBook, ElitePad, Elite, ProBook, Spectre, ZBook, and mt41 Thin Client devices allows remote attackers to modify data or cause a denial of service, or execute arbitrary code, via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:hspa\\+_gobi_4g:12.500.00.15.1802:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E2157AC-911C-478C-B0D3-A38B801CA395",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:lt4112_lte:12.500.00.15.1802:*:*:*:*:*:*:*",
              "matchCriteriaId": "C187ABC9-0E73-46F6-A66B-1808DFD284FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:elite_x2_1010_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8919E81-BECF-4DD7-A999-E2EB66DEEAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_1040_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2BB90C2-68A9-490C-8F14-82EC22B964C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_1040_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F92AB1-67A0-4581-800B-6B17E2265B6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_820_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC404B1D-897C-48E8-95CE-78E38A0E31C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_820_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7A5E00E-5EDA-4A9D-B35B-2B570D64E036",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_825_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD81C051-3DD3-40FB-8962-067F6C59D90A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_840_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FF3490-EE31-47C6-A040-F119AA781FDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_840_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE1405F-70C8-47E3-B7BE-D5AB01145F1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_845_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "625506BA-69E5-4D0E-89E4-DFC046D95C7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_850_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1748791-C1A2-4937-8F92-073E81931933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_850_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F95B2767-84AF-41F8-9319-527744725FCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_855_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEAE0B72-378B-45C9-8435-3561E20D861E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_folio_9470m:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A317BABE-B669-4482-A847-3CB6694BD2DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_revolve_810_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A34EB5CA-4832-4CFB-84E5-52B0AB5A22C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitebook_revolve_810_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4BA3B03-8DAD-4F47-8FDB-82F12600745A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:elitepad_1000_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9489A208-4CB2-43BE-B3FD-BE197B920B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:mt41_thin_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F19DFC10-3D12-4A2C-926C-F272214764B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_430_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4157E961-CDE4-4248-8567-772285BDCE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_430_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "518ACF4F-68DC-4552-BB5D-29D1806E1049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_440_g0:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A84BA2-A454-471D-8CC1-5D223943FE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_440_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD3B5B7-7BB1-43FF-B83F-A9E648685A25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_440_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68821AB4-9568-413D-B634-A8AB4A547437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_450_g0:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EB611EB-61A2-49BE-B8D3-5F5B5053907E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_450_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7ABC6B-25BB-431A-9D8C-D9A66F24EA36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_450_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E4D80E-BE04-40E1-A1B7-EEEEE5F9D5B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_640_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF356BC-AEC9-46CB-A269-204FED58B273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_645_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2E83F9-91ED-4997-A96C-2C1BCEF03B2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_650_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C9E1813-76B9-48D8-8481-A3021BB5EEA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_655_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6FB98F1-1007-48DD-A83A-6BA361B1D301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:probook_x2_620_g1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42684BEA-80BB-4A5C-B441-896D9384F899",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:spectre_x2_13-smb_pro:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3474A823-C215-4481-BD13-D5E078D83EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:zbook_14:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "631179C2-0607-480E-B42F-65BAA8FDC10E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:zbook_14_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4D29574-2555-4079-A2D4-4E92AD4F0B63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:zbook_15:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37620210-0FAE-46B0-AA72-7E56A8FD8EB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:zbook_15_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "006560A7-B052-493E-A0AF-69E387BB82D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:zbook_15u:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EEDDA07-EDFA-4628-B524-77C4E8E9E514",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:zbook_17_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2483EDC-75D6-422F-AB6E-E5BCF0BB6F5C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The HP lt4112 LTE/HSPA+ Gobi 4G module with firmware before 12.500.00.15.1803 on EliteBook, ElitePad, Elite, ProBook, Spectre, ZBook, and mt41 Thin Client devices allows remote attackers to modify data or cause a denial of service, or execute arbitrary code, via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad en el m\u00f3dulo HP lt4112 LTE/HSPA+ Gobi 4G con firmware anterior a 12.500.00.15.1803 en dispositivos Thin Client EliteBook, ElitePad, Elite, ProBook, Spectre, Zbook y mt41, permite a atacantes remotos modificar los datos, provocar una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2015-5368",
  "lastModified": "2024-11-21T02:32:53.687",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 7.8,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-08-27T15:59:01.797",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/76176"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1033414"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446601.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/76176"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1033414"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446601.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.