fkie_cve-2020-7205
Vulnerability from fkie_nvd
Published
2020-07-30 18:15
Modified
2024-11-21 05:36
Severity ?
Summary
A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the "Boot Hole" issue for HPE signed GRUB2 applications.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*", "matchCriteriaId": "457F590D-983B-4E3D-ACD5-6803C0D133FE", "versionEndExcluding": "1.72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen8_blade_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BE3D597-87C8-4CA6-83F6-53F7717AE704", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_bl660c_gen8_blade_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F591613-DFDF-449B-B10F-986B0465C881", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "346996C3-E131-4BE0-9261-E32D0567F795", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl360e_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFFBB73F-EAF7-47A2-BD06-FC31172E05B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl360p_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "47779C63-CDE4-4BE6-96BA-CBD118E027ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl380e_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7D81703-DB67-4650-959B-8787ED450AE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl380p_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AE425FF-B87E-40D6-A85F-7740418B3A9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl385p_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "136BEE6B-E5C0-40DC-9789-19AB131A9030", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CED1122-4927-4665-8D6B-A6C986ED6252", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "407DB236-65BF-4B41-9C75-4D5BC246A905", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml310e_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "7791C8B1-D949-4AEE-8BC5-40FECA8FBC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml350e_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "92436412-45F8-49EB-B02E-5405F21B42EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml350p_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FB075F0-2825-43F5-BA0A-8348A082580C", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_sl230s_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6795F47-30A0-4433-96FD-808AAF536F45", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_sl250s_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "533312DC-3EB0-4F15-B7A6-BFCE5CFABC6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_sl270s_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "361590CD-06A8-4BDF-9C24-053F31468A53", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_sl4540_gen8_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BE3EB0B-7828-4383-A1CB-650B59C9F19F", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ws460c_gen8_graphics_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFD07DCA-B8AF-409F-A902-AE66CB450152", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9F50030-ACB6-4C68-A256-F75679C61F71", "versionEndExcluding": "2.81", "vulnerable": true }, { "criteria": "cpe:2.3:a:hpe:service_pack_for_proliant:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C739A64-40D4-4E05-B401-F9A8E23689A0", "versionEndExcluding": "2020.03.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:hpe:smartstart_scripting_toolkit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "BAD81C97-029F-477F-B6D2-B212F5646238", "versionEndExcluding": "11.40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "C20D38E9-B2EA-4ECC-B9EC-D29BB249AC77", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_4520_chassis:-:*:*:*:*:*:*:*", "matchCriteriaId": "12F3BD74-5F29-4EC3-9D05-53060D5439AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:cloudline_cl3100_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9B1AB81-D2AB-4635-9C31-8A3435CA8DEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:cloudline_cl5200_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8BB0745-54DA-4792-B570-AE037E7C38D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:cloudline_cl5800_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "149886B8-4820-4D7F-ACA6-68FE3DE32D18", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D230E7A-D852-4040-83CF-164AA3233F00", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_bl660c_gen9_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "283E77B1-C09F-4A4F-A4ED-3CEED3F619F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6B65F98-15A8-48FA-A836-97430AF183EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1AD90B1-F95C-4A74-AAD5-684C0E0DCBC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E4F18F-55E2-4829-A1EF-881D06CC5481", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "31223B01-2107-479B-AC77-1C31BBE2F96C", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "34A65EC0-14C7-4838-913D-8EF11144A85B", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "52F6D2D0-482F-4B2F-AF78-82BC56704E8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl388_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "F72B02E9-DE68-4923-835F-EE62AFDF6158", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2068295-B73A-4C01-8351-C2D8B957845B", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3EB6796-FE83-42EB-84FF-F405289EE0B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4F7E5C6-201B-4268-9CA7-13BBA1E74DF0", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CF640F8-B432-40DA-93C8-77D8351CB390", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_m510_server_cartridge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D32FDE1-231C-4B62-97C3-88902ABC9EAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_m710x-l_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "D869E108-8DE7-4C90-A6B8-42A400F26595", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_m710x_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "A215D533-1739-43B9-B7C4-8F5012B64102", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml10_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "64EDAC0B-39A9-41FF-99AA-66A4422EFE53", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD3268D0-1F66-47BA-972C-21E809DC2F2E", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "2703B986-0709-4D89-8CAF-7C3FB63D7D3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9E7C549-3A1B-40DE-A1FC-0BC62040E4C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BB05A81-BDF5-4D6C-B9E3-1894703F1CC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_se2160w_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4587CAC-DED6-40CB-AC35-EA8E5650027E", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "66E10A5D-7C64-460A-9DBE-E5BCBBFDE6C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "58AE85AC-1062-42E2-8142-9BC754D51035", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BA2C97-7AAB-4A55-B487-522715BDC80C", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA80708D-3219-4D54-B167-105DDEC5B85D", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E62FEEB-A62D-42F4-A713-4CEAFF9B158E", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl260a_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "B488E17A-78BE-4B1B-BB22-9800DA0BC0A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "3844A137-DC09-4FEA-BB3F-CBC3E9046C6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CEE8B85-1F21-418F-B2D3-90151F6423BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C838C36-FFF2-4C90-8BF1-21984D6C9C88", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl740f_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EBB97C-4A68-4276-BFF2-93D58F6F1CA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl750f_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "425FCBD4-A94B-4AE5-B002-258CE1FE97FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:storeeasy_1000_storage_gen9:-:*:*:*:*:*:*:*", "matchCriteriaId": "6394FEE7-9D5A-453D-815E-6EFCFFB04AF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BE9486-493D-495E-8CFA-1E79FE57457C", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "789F7158-51DE-4344-BD8A-1249BFE0158B", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_660_gen9_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "0163D6F2-5E24-4741-BEF3-7B671A10CA08", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CBAD3B0-D47D-4E05-96D1-28A989E118CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_d3940_storage_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9A6DEE0-9327-4179-BEBA-2884B4070C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BA52CD1-7C72-449E-9F32-87279C4AAAFE", "versionEndIncluding": "3.30.213", "vulnerable": true }, { "criteria": "cpe:2.3:a:hpe:intelligent_provisioning:3.31:*:*:*:*:*:*:*", "matchCriteriaId": "51EEF7B6-4433-4214-B6F7-1621371D9DD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:hpe:intelligent_provisioning:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "7A489940-ACCA-4B1F-869E-F9D4BC8176F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hpe:service_pack_for_proliant:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C739A64-40D4-4E05-B401-F9A8E23689A0", "versionEndExcluding": "2020.03.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:hpe:smartstart_scripting_toolkit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "BAD81C97-029F-477F-B6D2-B212F5646238", "versionEndExcluding": "11.40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:cloudline_cl2100_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90ED4DF-0229-430D-A600-B2A777C73A4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:cloudline_cl2200_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "739EDD3F-4955-4B2D-A8E8-A092FB10BEC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:cloudline_cl2600_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "75304B66-21EA-4857-8B6C-B32D0457744A", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:cloudline_cl2800_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C7A743B-F9E2-4B70-94C2-920F2B7D18E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:cloudline_cl3100_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCB48BA1-2048-42F4-A195-F910B875196B", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:cloudline_cl3150_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEEDEF98-0D2B-4B9F-AAA6-305043D14F19", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:cloudline_cl4100_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FD84248-F258-4F3A-BD05-E474FE7D6697", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3A4A379-205A-479C-9C82-B182AEAEB8B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen9_special_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D87F1F6-28DA-433A-B43E-D105EE2B5EBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F58441-4DFB-42F3-AA93-500AAF712D1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:simplivity_2600_gen10:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E80FF0-0B78-4F6C-AB11-0F3CAEDED7E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:simplivity_325_gen10:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CA0D40-ECCC-4252-8CC3-7A1816301F43", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:simplivity_380_gen10:-:*:*:*:*:*:*:*", "matchCriteriaId": "7642DB17-72A4-4762-900F-D4F3B8AEAB1D", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:storeeasy_1000_storage_gen10:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3D3EB14-1FB5-4080-8CA1-B5549DC2678E", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "853AF641-B81C-4FB7-89AB-EACF420F0C62", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F15301B-B695-4DC8-9EE5-517AC2E64778", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "19188281-533B-450E-84F1-089F3300D08E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the \"Boot Hole\" issue for HPE signed GRUB2 applications." }, { "lang": "es", "value": "Se identific\u00f3 una posible vulnerabilidad de seguridad en HPE Intelligent Provisioning, Service Pack para ProLiant y HPE Scripting ToolKit. La vulnerabilidad podr\u00eda ser explotada localmente para permitir una ejecuci\u00f3n de c\u00f3digo arbitraria durante el proceso de arranque. ** Nota: ** Esta vulnerabilidad est\u00e1 relacionada con el uso de insmod en GRUB2 en el producto HPE afectado espec\u00edfico y HPE est\u00e1 abordando este problema. HPE ha realizado las siguientes actualizaciones de software e informaci\u00f3n de mitigaci\u00f3n para resolver la vulnerabilidad en Intelligent Provisioning, Service Pack para ProLiant y HPE Scripting ToolKit. HPE proporcion\u00f3 la \u00faltima versi\u00f3n de Intelligent Provisioning, Service Pack para ProLiant y HPE Scripting Toolkit, que incluye el parche de GRUB2 para resolver esta vulnerabilidad. Estas nuevas im\u00e1genes de arranque actualizar\u00e1n GRUB2 y la base de datos de firmas prohibidas (DBX). Una vez que la DBX est\u00e1 actualizada, los usuarios no ser\u00e1n capaces de iniciar desde el antiguo IP, SPP o Scripting ToolKit con Secure Boot habilitado. HPE ha proporcionado una herramienta de actualizaci\u00f3n DBX dedicada para trabajar con Microsoft Windows y sistemas operativos Linux compatibles. Estas herramientas puede ser usadas para actualizar la Forbidden Signature Database (DBX) desde el Sistema Operativo. **Nota:** Esta actualizaci\u00f3n de DBX mitiga el problema de GRUB2 con insmod habilitado y el problema \"Boot Hole\" para las aplicaciones GRUB2 firmadas por HPE" } ], "id": "CVE-2020-7205", "lastModified": "2024-11-21T05:36:49.470", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-30T18:15:11.737", "references": [ { "source": "security-alert@hpe.com", "tags": [ "Vendor Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04020en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04020en_us" } ], "sourceIdentifier": "security-alert@hpe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.