Input validation error in Certain HPE Apollo Servers



Published: 2023-03-13
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-26006
CWE-ID CWE-20
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure
Hardware solutions / Firmware

HPE ProLiant XL730f Gen9 Server
Hardware solutions / Firmware

HPE ProLiant XL750f Gen9 Server
Hardware solutions / Firmware

HPE ProLiant XL740f Gen9 Server
Hardware solutions / Firmware

Vendor HPE

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Input validation error

EUVDB-ID: #VU69115

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-26006

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in the BIOS firmware. A local user can run a specially crafted program to escalate privileges on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure: before 3.04_08-04-2022

HPE ProLiant XL730f Gen9 Server: before 3.04_08-04-2022

HPE ProLiant XL750f Gen9 Server: before 3.04_08-04-2022

HPE ProLiant XL740f Gen9 Server: before 3.04_08-04-2022

External links

http://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04374en_us


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###