Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-7205

Опубликовано: 30 июл. 2020
Источник: nvd
CVSS3: 6.7
CVSS2: 7.2
EPSS Низкий

Описание

A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. Note: This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Micro

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*
Версия до 1.72 (исключая)

Одно из

cpe:2.3:h:hpe:proliant_bl460c_gen8_blade_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_bl660c_gen8_blade_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl160_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl360e_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl360p_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl380e_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl380p_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl385p_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl560_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl580_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml310e_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml350e_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml350p_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_sl230s_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_sl250s_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_sl270s_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_sl4540_gen8_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ws460c_gen8_graphics_server_blade:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

Одно из

cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*
Версия до 2.81 (исключая)
cpe:2.3:a:hpe:service_pack_for_proliant:*:*:*:*:*:*:*:*
Версия до 2020.03.0 (исключая)
cpe:2.3:a:hpe:smartstart_scripting_toolkit:*:*:*:*:*:linux:*:*
Версия до 11.40 (исключая)

Одно из

cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:apollo_4520_chassis:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:cloudline_cl3100_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:cloudline_cl5200_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:cloudline_cl5800_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_bl660c_gen9_server_blade:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl20_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl388_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_m510_server_cartridge:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_m710x-l_server_blade:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_m710x_server_blade:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml10_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml30_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_se2160w_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl260a_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl270d_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl740f_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl750f_gen9_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:storeeasy_1000_storage_gen9:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:synergy_660_gen9_compute_module:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:synergy_d3940_storage_module:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

Одно из

cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*
Версия до 3.30.213 (включая)
cpe:2.3:a:hpe:intelligent_provisioning:3.31:*:*:*:*:*:*:*
cpe:2.3:a:hpe:intelligent_provisioning:3.40:*:*:*:*:*:*:*
cpe:2.3:a:hpe:service_pack_for_proliant:*:*:*:*:*:*:*:*
Версия до 2020.03.0 (исключая)
cpe:2.3:a:hpe:smartstart_scripting_toolkit:*:*:*:*:*:linux:*:*
Версия до 11.40 (исключая)

Одно из

cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:cloudline_cl2100_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:cloudline_cl2200_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:cloudline_cl2600_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:cloudline_cl2800_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:cloudline_cl3100_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:cloudline_cl3150_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:cloudline_cl4100_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_microserver_gen10:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl270d_gen9_special_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:simplivity_2600_gen10:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:simplivity_325_gen10:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:simplivity_380_gen10:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:storeeasy_1000_storage_gen10:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*

EPSS

Процентиль: 29%
0.00108
Низкий

6.7 Medium

CVSS3

7.2 High

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

github
больше 3 лет назад

A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Mi...

EPSS

Процентиль: 29%
0.00108
Низкий

6.7 Medium

CVSS3

7.2 High

CVSS2

Дефекты

NVD-CWE-noinfo
Уязвимость CVE-2020-7205