6 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 754EXPL: 0

HP has identified a potential vulnerability in BIOS firmware of some Workstation products. Firmware updates are being released to mitigate these potential vulnerabilities. • https://support.hp.com/us-en/document/ish_3982318-3982351-16/hpsbhf03735 •

CVSS: 7.8EPSS: 0%CPEs: 481EXPL: 0

A potential security vulnerability has been identified in the HP Jumpstart software, which might allow escalation of privilege. HP is recommending that customers uninstall HP Jumpstart and use myHP software. Se ha identificado una posible vulnerabilidad de seguridad en el software HP Jumpstart, que podría permitir una escalada de privilegios. HP recomienda que los clientes desinstalen HP Jumpstart y utilicen el software myHP. • https://support.hp.com/us-en/document/ish_6189329-6189528-16/hpsbhf03791 •

CVSS: 6.0EPSS: 0%CPEs: 285EXPL: 0

Incorrect access control in the firmware of Synaptics VFS75xx family fingerprint sensors that include external flash (all versions prior to 2019-11-15) allows a local administrator or physical attacker to compromise the confidentiality of sensor data via injection of an unverified partition table. Un control de acceso incorrecto en el firmware de los sensores de huellas dactilares de la familia Synaptics VFS75xx que incluye flash externo (todas las versiones anteriores al 15/11/2019) permite a un administrador local o atacante físico comprometer la confidencialidad de los datos del sensor por medio de una inyección de una tabla de partición no verificada • https://support.hp.com/us-en/document/c06696474 https://support.lenovo.com/us/en/product_security/LEN-31372 https://www.synaptics.com/company/blog https://www.synaptics.com/sites/default/files/fingerprint-sensor-VFS7500-security-brief-2020-07-14.pdf •

CVSS: 4.6EPSS: 0%CPEs: 68EXPL: 1

A BIOS password extraction vulnerability has been reported on certain consumer notebooks with firmware F.22 and others. The BIOS password was stored in CMOS in a way that allowed it to be extracted. This applies to consumer notebooks launched in early 2014. Se ha notificado una vulnerabilidad de extracción de contraseñas de la BIOS en determinados notebooks de consumo con firmware F.22 y otros. La contraseña de la BIOS se almacenó en CMOS de forma que permitía su extracción. • https://github.com/BaderSZ/CVE-2017-2751 https://support.hp.com/us-en/document/c05913581 • CWE-522: Insufficiently Protected Credentials •

CVSS: 7.8EPSS: 4%CPEs: 39EXPL: 0

The HP lt4112 LTE/HSPA+ Gobi 4G module with firmware before 12.500.00.15.1803 on EliteBook, ElitePad, Elite, ProBook, Spectre, ZBook, and mt41 Thin Client devices allows remote attackers to modify data or cause a denial of service, or execute arbitrary code, via unspecified vectors. Vulnerabilidad en el módulo HP lt4112 LTE/HSPA+ Gobi 4G con firmware anterior a 12.500.00.15.1803 en dispositivos Thin Client EliteBook, ElitePad, Elite, ProBook, Spectre, Zbook y mt41, permite a atacantes remotos modificar los datos, provocar una denegación de servicio o ejecutar código arbitrario a través de vectores no especificados. • http://www.securityfocus.com/bid/76176 http://www.securitytracker.com/id/1033414 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446601.htm https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272 https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •