• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

High Severity Vulnerabilities Found in HP Enterprise Devices

You are here: Home / General Cyber Security News / High Severity Vulnerabilities Found in HP Enterprise Devices
September 12, 2022

The Binarly security investigate workforce has disclosed 6 high–severity firmware vulnerabilities the business located more than the program of the year.

Very first discussed at the Black Hat 2022 conference, the flaws affect HP EliteBook units and have Common Vulnerability Scoring Procedure (CVSS) scores amongst 7.5 and 8.2.

“A firmware implant is the ultimate purpose for an attacker to preserve persistence,” Binarly wrote in an advisory past Thursday. “The attacker can install the malicious implant on different concentrations of the firmware, either as a modified authentic module or a standalone driver.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In accordance to the document, the impact of concentrating on unprivileged non–system administration mode (SMM) driver execution natural environment (DXE) runtime drivers or apps by a risk actor is normally underestimated, and this kind of malicious DXE driver can bypass Safe Boot and affect extra boot levels.

“In several instances, firmware is a solitary point of failure in between all the layers of the offer chain and the endpoint purchaser machine,” Binarly wrote.

The corporation also warned that some of the HP Company vulnerabilities it disclosed at Black Hat have not but been patched.

“Unfortunately, at the time of creating, some HP company equipment (laptops and desktops) have however not been given updates to patch the aforementioned vulnerabilities, despite them currently being publicly disclosed for about a month,” the advisory reads.

At the exact same time, the security firm explained it has designed out there in its GitHub repository the FwHunt principles for the HP vulnerabilities talked about in its most recent advisory.

“We really encourage defenders and investigation companions to use these policies to scope, at scale, susceptible gadgets in their business infrastructure,” Binarly stated.

“Additionally, these rules are getting pushed to the Linux Vendor Firmware Company (LVFS) to increase the source chain security and awareness in enterprise environments around the world.”

The Binarly advisory will come months soon after a report by Workforce82 prompt the quantity of vulnerability disclosures impacting extended internet of factors (XIoT) devices improved by 57% in the to start with fifty percent of 2022.


Some elements of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Oxeye Discovers Several High Severity IDOR Vulnerabilities in Harbor
Next Post: US Treasury Sanctions Iranian Minister Over Hacking of Govt and Allies Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
  • Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
  • New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
  • Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability
  • MongoDB CISO: Don’t be afraid to simplify important issues for executives
  • Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam
  • Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
  • Lazarus blamed for 3CX attack as byte-to-byte code match discovered
  • New Cylance Ransomware strain emerges, experts speculate about its notorious members
  • 3CX Supply Chain Attack — Here’s What We Know So Far

Copyright © TheCyberSecurity.News, All Rights Reserved.