var-201603-0040
Vulnerability from variot

Sure Start on HP Commercial PCs 2015 allows local users to cause a denial of service (BIOS recovery failure) by leveraging administrative access. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. HP ZBook, etc. ZBook is a set of mobile workstations (high-performance mobile computers); HP EliteBook Folio 1000/800/700 Series are all commercial computer products; HP Z240 Tower/Z240 SFF/Z238 Microtower Workstation N51 are workstations (high-performance computers). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

Note: the current version of the following document is available here: https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05012469

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05012469 Version: 1

HPSBHF03439 rev.1 - HP Commercial PCs with Sure Start, Local Denial of Service NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2016-02-25 Last Updated: 2016-02-26

Potential Security Impact: Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY

HP has identified a potential security vulnerability with the Sure Start implementation on certain 2015 commercial platforms. This vulnerability could be exploited locally by administrator or root level privileges and if compromised, the Sure Start systems could fail to recover the BIOS.

References:

  • CVE-2016-2243
  • PSRT110027

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP Commercial Notebook, Desktop, and Workstation versions See the tables in the vulnerability resolution for the impacted products.

BACKGROUND

For a PGP signed version of this security bulletin please write to: security-alert@hp.com

For a PGP signed version of this security bulletin please write to: hp-security-alert@hp.com

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2016-2243 (AV:L/AC:L/Au:N/C:P/I:C/A:P) 6.1 ================================================================================ Information on CVSS is documented in HP Customer Notice: HPSN2008002.

RESOLUTION

HP has made the following product updates available for the impacted products.

To acquire the firmware updates, go to http://www.hp.com

  1. Select Support and then Download Drivers.

  2. Enter your product name or number in the Find my product field.

  3. Choose the product from the returned search.

  4. Choose the operating system.

  5. Under the Download Index, select BIOS, and download the BIOS version as listed in the table below. Follow the installation instructions to install the firmware update.

Series Product name BIOS Version Win Softpaq

ZBook HP ZBook 15 G3 & ZBook 17 G3 1.03 SP74756

ZBook HP ZBook 15u G3 1.03 SP74756

ZBook HP ZBook Studio G3 1.04 SP74757

1000 Series HP EliteBook Folio 1040 G3 1.01 SP74768

1000 Series HP EliteBook Folio 1012 x2 G2 1.1 SP74770

1000 Series HP EliteBook 840 G3 1.04 SP74748

1000 Series HP EliteBook 850 G3 1.04 SP74748

1000 Series HP EliteBook 820 G3 1.04 SP74748

700 series HP Elitebook 745 G3 1.08 SP74691

700 series HP Elitebook 755 G3 1.08 SP74691

700 series HP Elitebook 725 G3 1.08 SP74691

700 series HP mt42 Mobile Thin Client 1.05 SP74761

800 series HP EliteDesk 800 G2 TWR 2.09 SP74661

800 series HP EliteDesk 800 G2 DM 2.1 SP74666

800 series HP mp9 G2 Retail System 2.1 SP74666

800 series HP EliteDesk 800 SFF 2.09 SP74661

800 series HP EliteOne 800 G2 23-in T/NT 2.1 SP74680

700 series HP EliteDesk 705 G2 MT/SFF 2.09 SP74655

700 series HP EliteDesk 705 G2 DM 2.05 SP74677

700 series HP EliteOne 705 G2 23in AiO T/NT 2.07 SP74686

       Product name              BIOS Version  Win Softpaq  Linux Softpaq

HP Z240 Tower Workstation N51 01.11 SP74759 SP74760

HP Z240 SFF Workstation N51 01.11 SP74759 SP74760

HP Z238 Microtower Workstation N51 01.11 SP74759 SP74760

System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."

REVISION HISTORY

Version:1 (rev.1) 10 February 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send email to hpsecurityalert@hp.com

Report: To report a potential security vulnerability with any HP supported product, send email to: hpsecurityalert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://support.hp.com/us/en/subscribe/

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ secBullArchive

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

PI = HP Printing and Imaging HF = HP Hardware and Firmware ST = HP Storage Software GN = HP General Software

Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: hp-security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the securityalert PGP key, please send an email message as follows: To: hpsecurityalert@hp.com Subject: get key

Products: HP ZBook 15 G3 & ZBook 17 G3, HP ZBook 15u G3, HP ZBook Studio G3, HP EliteBook Folio 1040 G3, HP EliteBook Folio 1012 x2 G2, HP EliteBook 840 G3, HP EliteBook 850 G3, HP EliteBook 820 G3, H Elitebook 745 G3, HP Elitebook 755 G3, HP Elitebook 725 G3, HP mt42 Mobile Thin Client, HP EliteDesk 8, HP Z240 Tower Workstation N51, HP Z240 SFF Workstation N51, HP Z238 Microtower Workstation N51

Copyright 2016 Hewlett-Packard Development Company, L.P.

Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2

iQIcBAEBCAAGBQJW2LawAAoJEPRuzn0I+N3ZlBQP/iZAxEvLMV62tYPB9zLr//rW 1vK8FkjwQfEuVqL4L6t1kOg8nw9jV/BEh2pYLf94J2LBhFVLJLis7wQhgLZA5ZHa L4Qu1w9QaLjRod74Un2dFXJCYe9Hdqwrk/cAGsTKOg95jaC/IMmULsxIVZoRXtdg d0k0FP2KJjh5qMfDFJSinGn0rmLuVQAzftJ1di2C9/xZ1RLGDId/znZVIrUgzsc2 ngqCVkcxT+0IvngY3vo22mbCv4woZtgR2hIV/FbMOXGOKF0Rj1pWpW5RAYy2aIir /9kT/6RA3+3HLGklROBBwsBarkoo/iUtGeXOLLMCFqn4fxmQLZv4/QqgGHhE8Dll NYwWkJjN1eCc6JsTsV0fny05kS3XDAPY3O1pSohVqgeagn4Ajn1f2FzwgQxOXQZR HPU/29jOs/UwWl5pBkhLX/DiCbIr+VxHCgRGXHKFeCFjFVW4vZcyLwF15H8jdeXq +KNGC8gNdlGeJljBfqBPebws3Iiha8yq+4AvSFI3U6VWozOgRf0WFTqO7r9fiCe9 pYubR8komb7uAzX6jGYkfjIU4Y2ya+l2YKH1snr2TELXYVv6Hf68zYzwCtxdBvGV N78pM4OcvAkurqIaW5skyjVVp2VWc5IZpN9wLmnzj8mj/75yRdbajYndH4x74gXi Mz+Ss7PPSnhjGvCLKb1P =Ftsm -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201603-0040",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "elitebook folio 1012 x2 g2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "1000 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.04"
      },
      {
        "model": "zbook",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.04"
      },
      {
        "model": "700 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.09"
      },
      {
        "model": "zbook",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.03"
      },
      {
        "model": "800 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.09"
      },
      {
        "model": "700 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.05"
      },
      {
        "model": "1000 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.1"
      },
      {
        "model": "700 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.05"
      },
      {
        "model": "700 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.07"
      },
      {
        "model": "700 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.08"
      },
      {
        "model": "z238",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.11"
      },
      {
        "model": "800 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.1"
      },
      {
        "model": "1000 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.01"
      },
      {
        "model": "z240",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.11"
      },
      {
        "model": "hp elitebook 1000 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitebook 700 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitebook 725 g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitebook 745 g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitebook 755 g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitebook 820 g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitebook 840 g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitebook 850 g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitebook folio 1012 x2 g2",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitebook folio 1040 g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitedesk 705 g2 dm",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitedesk 705 g2 mt/sff",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitedesk 800 g2 dm",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitedesk 800 g2 twr",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitedesk 800 sff",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp elitedesk 800 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp eliteone 705 g2 23in aio t/nt",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp eliteone 800 g2 23-in t/nt",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp mp9 g2 retail system",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp mt42 mobile thin client",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp z238 microtower workstation n51",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp z238 microtower workstation",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp z240 sff workstation n51",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp z240 tower workstation n51",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp z240 workstation",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp zbook 15 g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp zbook 15u g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp zbook 17 g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp zbook studio g3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp zbook",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "elitebook 850 g3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "elitebook 840 g3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "elitedesk 800 g2 dm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "elitebook folio 1040 g3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "mt42 mobile thin client",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "elitebook 820 g3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "elitedesk 705 g2 dm",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "eliteone 705 g2 23in aio t\\\\\\/nt",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "zbook studio g3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-033"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2243"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:hp:1000_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:700_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitebook_725_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitebook_745_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitebook_755_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitebook_820_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitebook_840_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitebook_850_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitebook_folio_1012_x2_g2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitebook_folio_1040_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitedesk_705_g2_dm",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitedesk_705_g2_mt_sff",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitedesk_800_g2_dm",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitedesk_800_g2_twr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:elitedesk_800_sff",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:800_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:eliteone_705_g2_23in_aio_t%2Fnt",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:eliteone_800_g2_23in_t%2Fnt",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:mp9_g2_retail_system",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:mt42_mobile_thin_client",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:z238_microtower_workstation_n51",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:z238_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:z240_sff_workstation_n51",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:z240_tower_workstation_n51",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:z240_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:zbook_15_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:zbook_15u_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:zbook_17_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:zbook_studio_g3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:zbook_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "HP",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "136085"
      }
    ],
    "trust": 0.1
  },
  "cve": "CVE-2016-2243",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 5.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.4,
            "id": "CVE-2016-2243",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 5.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.4,
            "id": "VHN-91062",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:N/I:P/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.9,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.5,
            "id": "CVE-2016-2243",
            "impactScore": 5.8,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-2243",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-2243",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201603-033",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-91062",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-033"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2243"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sure Start on HP Commercial PCs 2015 allows local users to cause a denial of service (BIOS recovery failure) by leveraging administrative access. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. HP ZBook, etc. ZBook is a set of mobile workstations (high-performance mobile computers); HP EliteBook Folio 1000/800/700 Series are all commercial computer products; HP Z240 Tower/Z240 SFF/Z238 Microtower Workstation N51 are workstations (high-performance computers). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05012469\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c05012469\nVersion: 1\n\nHPSBHF03439 rev.1 - HP Commercial PCs with Sure Start, Local Denial of Service\nNOTICE: The information in this Security Bulletin should be acted upon as soon\nas possible. \n\nRelease Date: 2016-02-25\nLast Updated: 2016-02-26\n\nPotential Security Impact: Denial of Service (DoS)\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\n\nHP has identified a potential security vulnerability with the Sure Start\nimplementation on certain 2015 commercial platforms. This vulnerability could\nbe exploited locally by administrator or root level privileges and if\ncompromised, the Sure Start systems could fail to recover the BIOS. \n\nReferences:\n\n  * CVE-2016-2243\n  * PSRT110027\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nHP Commercial Notebook, Desktop, and Workstation versions See the tables in the\nvulnerability resolution for the impacted products. \n\nBACKGROUND\n\nFor a PGP signed version of this security bulletin please write to:\nsecurity-alert@hp.com\n\nFor a PGP signed version of this security bulletin please write to:\nhp-security-alert@hp.com\n\nCVSS 2.0 Base Metrics\n================================================================================\nReference                      Base Vector                   Base Score\nCVE-2016-2243        (AV:L/AC:L/Au:N/C:P/I:C/A:P)               6.1\n================================================================================\nInformation on CVSS is documented in HP Customer Notice: HPSN2008002. \n\nRESOLUTION\n\nHP has made the following product updates available for the impacted products. \n\nTo acquire the firmware updates, go to http://www.hp.com\n\n 1. Select Support and then Download Drivers. \n\n 2. Enter your product name or number in the Find my product field. \n\n 3. Choose the product from the returned search. \n\n 4. Choose the operating system. \n\n 5. Under the Download Index, select BIOS, and download the BIOS version as\n    listed in the table below. Follow the installation instructions to install\n    the firmware update. \n\n   Series                Product name              BIOS Version   Win Softpaq\n\nZBook         HP ZBook 15 G3 \u0026 ZBook 17 G3         1.03           SP74756\n\nZBook         HP ZBook 15u G3                      1.03           SP74756\n\nZBook         HP ZBook Studio G3                   1.04           SP74757\n\n1000 Series   HP EliteBook Folio 1040 G3           1.01           SP74768\n\n1000 Series   HP EliteBook Folio 1012 x2 G2        1.1            SP74770\n\n1000 Series   HP EliteBook 840 G3                  1.04           SP74748\n\n1000 Series   HP EliteBook 850 G3                  1.04           SP74748\n\n1000 Series   HP EliteBook 820 G3                  1.04           SP74748\n\n700 series    HP Elitebook 745 G3                  1.08           SP74691\n\n700 series    HP Elitebook 755 G3                  1.08           SP74691\n\n700 series    HP Elitebook 725 G3                  1.08           SP74691\n\n700 series    HP mt42 Mobile Thin Client           1.05           SP74761\n\n800 series    HP EliteDesk 800 G2 TWR              2.09           SP74661\n\n800 series    HP EliteDesk 800 G2 DM               2.1            SP74666\n\n800 series    HP mp9 G2 Retail System              2.1            SP74666\n\n800 series    HP EliteDesk 800 SFF                 2.09           SP74661\n\n800 series    HP EliteOne 800 G2 23-in T/NT        2.1            SP74680\n\n700 series    HP EliteDesk 705 G2 MT/SFF           2.09           SP74655\n\n700 series    HP EliteDesk 705 G2 DM               2.05           SP74677\n\n700 series    HP EliteOne 705 G2 23in AiO T/NT     2.07           SP74686\n\n           Product name              BIOS Version  Win Softpaq  Linux Softpaq\n\nHP Z240 Tower Workstation N51        01.11         SP74759      SP74760\n\nHP Z240 SFF Workstation N51          01.11         SP74759      SP74760\n\nHP Z238 Microtower Workstation N51   01.11         SP74759      SP74760\n\nSystem management and security procedures must be reviewed frequently to\nmaintain system integrity. HP is continually reviewing and enhancing the\nsecurity features of software products to provide customers with current secure\nsolutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the\nattention of users of the affected HP products the important security\ninformation contained in this Bulletin. HP recommends that all users determine\nthe applicability of this information to their individual situations and take\nappropriate action. HP does not warrant that this information is necessarily\naccurate or complete for all user situations and, consequently, HP will not be\nresponsible for any damages resulting from user\u0027s use or disregard of the\ninformation provided in this Bulletin. To the extent permitted by law, HP\ndisclaims all warranties, either express or implied, including the warranties\nof merchantability and fitness for a particular purpose, title and\nnon-infringement.\"\n\nREVISION HISTORY\n\nVersion:1 (rev.1)  10 February 2016 Initial release\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send email to hpsecurityalert@hp.com\n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send email to: hpsecurityalert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email: http://support.hp.com/us/en/subscribe/\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/\nsecBullArchive\n\nSoftware Product Category: The Software Product Category is represented in the\ntitle by the two characters following HPSB. \n\nPI = HP Printing and Imaging\nHF = HP Hardware and Firmware\nST = HP Storage Software\nGN = HP General Software\n\nSupport: For further information, contact normal HP Services support channel. \nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: hp-security-alert@hp.com It is strongly recommended\nthat security related information being communicated to HP be encrypted using\nPGP, especially exploit information. \nTo get the securityalert PGP key, please send an email message as follows:\nTo: hpsecurityalert@hp.com\nSubject: get key\n\nProducts: HP ZBook 15 G3 \u0026 ZBook 17 G3, HP ZBook 15u G3, HP ZBook Studio G3, HP\nEliteBook Folio 1040 G3, HP EliteBook Folio 1012 x2 G2, HP EliteBook 840 G3, HP\nEliteBook 850 G3, HP EliteBook 820 G3, H Elitebook 745 G3, HP Elitebook 755 G3,\nHP Elitebook 725 G3, HP mt42 Mobile Thin Client, HP EliteDesk 8, HP Z240 Tower\nWorkstation N51, HP Z240 SFF Workstation N51, HP Z238 Microtower Workstation\nN51\n\nCopyright 2016 Hewlett-Packard Development Company, L.P. \n\nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or its\naffiliates, subcontractors or suppliers will be liable for incidental,special\nor consequential damages including downtime cost; lost profits;damages relating\nto the procurement of substitute products or services; or damages for loss of\ndata, or software restoration. The information in this document is subject to\nchange without notice. Hewlett-Packard Company and the names of Hewlett-Packard\nproducts referenced herein are trademarks of Hewlett-Packard Company in the\nUnited States and other countries. Other product and company names mentioned\nherein may be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2\n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\nMz+Ss7PPSnhjGvCLKb1P\n=Ftsm\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-2243"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91062"
      },
      {
        "db": "PACKETSTORM",
        "id": "136085"
      }
    ],
    "trust": 1.8
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-91062",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91062"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-2243",
        "trust": 2.6
      },
      {
        "db": "SECTRACK",
        "id": "1035193",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-033",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2016.0582",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "136085",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-91062",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      },
      {
        "db": "PACKETSTORM",
        "id": "136085"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-033"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2243"
      }
    ]
  },
  "id": "VAR-201603-0040",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91062"
      }
    ],
    "trust": 0.85
  },
  "last_update_date": "2024-11-23T22:34:50.832000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBHF03439",
        "trust": 0.8,
        "url": "https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05012469"
      },
      {
        "title": "Multiple HP Product denial of service vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60394"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-033"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-284",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2243"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://h20565.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c05012469"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1035193"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2243"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2243"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/render.html?it=31937"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2243"
      },
      {
        "trust": 0.1,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/"
      },
      {
        "trust": 0.1,
        "url": "http://www.hp.com"
      },
      {
        "trust": 0.1,
        "url": "http://support.hp.com/us/en/subscribe/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      },
      {
        "db": "PACKETSTORM",
        "id": "136085"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-033"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2243"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-91062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      },
      {
        "db": "PACKETSTORM",
        "id": "136085"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-033"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2243"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-03-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-91062"
      },
      {
        "date": "2016-03-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      },
      {
        "date": "2016-03-04T22:51:18",
        "db": "PACKETSTORM",
        "id": "136085"
      },
      {
        "date": "2016-03-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201603-033"
      },
      {
        "date": "2016-03-04T15:59:00.107000",
        "db": "NVD",
        "id": "CVE-2016-2243"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-91062"
      },
      {
        "date": "2016-03-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      },
      {
        "date": "2016-03-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201603-033"
      },
      {
        "date": "2024-11-21T02:48:06.007000",
        "db": "NVD",
        "id": "CVE-2016-2243"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-033"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific  HP Commercial PC 2015 Run on  Sure Start Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001709"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-033"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.