var-201812-0624
Vulnerability from variot

The HPE-provided Windows firmware installer for certain Gen9, Gen8, G7,and G6 HPE servers allows local disclosure of privileged information. This issue was resolved in previously provided firmware updates as follows. The HPE Windows firmware installer was updated in the system ROM updates which also addressed the original Spectre/Meltdown set of vulnerabilities. At that time, the Windows firmware installer was also updated in the versions of HPE Integrated Lights-Out 2, 3, and 4 (iLO 2, 3, and 4) listed in the security bulletin. The updated HPE Windows firmware installer was released in the system ROM and HPE Integrated Lights-Out (iLO) releases documented in earlier HPE Security Bulletins: HPESBHF03805, HPESBHF03835, HPESBHF03831. Windows-based systems that have already been updated to the system ROM or iLO versions described in these security bulletins require no further action. plural HPE The product contains an information disclosure vulnerability. Vendors report this vulnerability HPESBHF03805 , HPESBHF03835 , HPESBHF03831 Published as.Information may be obtained. HPE Integrated Lights-Out is a set of remote control solutions from Hewlett Packard Enterprise (HPE). This solution enables remote monitoring and operation and maintenance of IT assets such as servers. A local attacker could exploit this vulnerability to obtain sensitive information

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201812-0624",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "proliant dl580 gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.00_02-22-2018"
      },
      {
        "model": "integrated lights-out 3",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.90"
      },
      {
        "model": "proliant m510 server cartridge",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.64_01-22-2018"
      },
      {
        "model": "proliant dl385p gen8 \\",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.03.14"
      },
      {
        "model": "proliant sl210t gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant dl360 g7 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant dl380 g7 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "proliant ml110 g7 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant m300 server cartridge",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant ml370 g6 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant dl380p gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant microserver gen8",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant xl250a gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant ml350p gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant sl270s gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant dl80 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl160 g6 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "proliant dl360 g6 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant dl360p gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant dl360 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl380e gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant sl4545 g7 server \\",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.03.14\\(a\\)"
      },
      {
        "model": "proliant dl180 g6 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "proliant bl2x220c g6 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant ml350 g6 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant xl740f gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant bl2x220c g7 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant ml350e gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant ml10 v2 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant dl180 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl360e gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant dl560 gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant bl620c g7 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant bl660c gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl20 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant sl390s g7 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant dl120 g7 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant xl270d gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl585 g7 server \\",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.03.14"
      },
      {
        "model": "proliant dl580 g7 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant thin micro tm200 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl980 g7 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant sl170z g6 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "proliant dl60 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant bl685c g7 server blade \\",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.03.14"
      },
      {
        "model": "proliant bl465c gen8 \\",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.03.14"
      },
      {
        "model": "proliant dl120 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant m710x server cartridge",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.64_01-22-2018"
      },
      {
        "model": "proliant dl380 g6 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant sl250s gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant xl190r gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl320e gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant ml110 g6 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "proliant ml350 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant ml330 g6 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant xl730f gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant sl4540 gen8 1 node server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant dl370 g6 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant bl460c gen8 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant bl660c gen8 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant dl160 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant bl465c g7 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.03.14"
      },
      {
        "model": "proliant ml150 g6 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "proliant bl280c g6 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant dl560 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl380 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl320 g6 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant bl460c gen9 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant m710p server cartridge",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant xl750f gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "integrated lights-out 2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.33"
      },
      {
        "model": "proliant ml350e gen8 v2 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "integrated lights-out 4",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.60"
      },
      {
        "model": "proliant sl2x170z g6 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "proliant dl320e gen8 v2 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant bl420c gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant xl260a gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "1.60_01-22-2018"
      },
      {
        "model": "proliant dl385 g7 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.03.14"
      },
      {
        "model": "proliant bl680c g7 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant dl170e g6 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "proliant ml310e gen8 v2 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant sl160s g6 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "proliant ml30 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant bl490c g6 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant dl170h g6 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "proliant ws460c gen9 workstation",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant xl170r gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant ml10 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant bl460c g7 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant m710 server cartridge",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant bl460c g6 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant ml110 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant ml310e gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant xl450 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant bl490c g7 server blade",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.05.21"
      },
      {
        "model": "proliant xl230a gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl120 g6 server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "proliant m350 server cartridge",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant ml150 gen9 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "proliant dl160 gen8 server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2018.01.22"
      },
      {
        "model": "proliant xl270d gen9 accelerator tray",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "hp",
        "version": "2.56_01-22-2018"
      },
      {
        "model": "hpe integrated lights-out 2",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hpe integrated lights-out 3",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hpe integrated lights-out 4",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hpe proliant xl260a gen9 server",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hpe proliant xl270d gen9 accelerator tray",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hpe proliant xl270d gen9 server",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hpe proliant xl450 gen9 server",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hpe proliant xl730f gen9 server",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hpe proliant xl740f gen9 server",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hpe proliant xl750f gen9 server",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7112"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:hp:integrated_lights-out_2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:integrated_lights-out_3_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:integrated_lights-out_4_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:proliant_xl260a_gen9_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:proliant_xl270d_gen9_accelerator_tray_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:proliant_xl270d_gen9_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:proliant_xl450_gen9_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:proliant_xl730f_gen9_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:proliant_xl740f_gen9_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:proliant_xl750f_gen9_server_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      }
    ]
  },
  "cve": "CVE-2018-7112",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7112",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-137144",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7112",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7112",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-7112",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201810-1322",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137144",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1322"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7112"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The HPE-provided Windows firmware installer for certain Gen9, Gen8, G7,and G6 HPE servers allows local disclosure of privileged information. This issue was resolved in previously provided firmware updates as follows. The HPE Windows firmware installer was updated in the system ROM updates which also addressed the original Spectre/Meltdown set of vulnerabilities. At that time, the Windows firmware installer was also updated in the versions of HPE Integrated Lights-Out 2, 3, and 4 (iLO 2, 3, and 4) listed in the security bulletin. The updated HPE Windows firmware installer was released in the system ROM and HPE Integrated Lights-Out (iLO) releases documented in earlier HPE Security Bulletins: HPESBHF03805, HPESBHF03835, HPESBHF03831. Windows-based systems that have already been updated to the system ROM or iLO versions described in these security bulletins require no further action. plural HPE The product contains an information disclosure vulnerability. Vendors report this vulnerability HPESBHF03805 , HPESBHF03835 , HPESBHF03831 Published as.Information may be obtained. HPE Integrated Lights-Out is a set of remote control solutions from Hewlett Packard Enterprise (HPE). This solution enables remote monitoring and operation and maintenance of IT assets such as servers. A local attacker could exploit this vulnerability to obtain sensitive information",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7112"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137144"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7112",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1041984",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1322",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-137144",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1322"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7112"
      }
    ]
  },
  "id": "VAR-201812-0624",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137144"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:45:08.179000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "hpesbhf03805en_us",
        "trust": 0.8,
        "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03805en_us"
      },
      {
        "title": "hpesbhf03831en_us",
        "trust": 0.8,
        "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03831en_us"
      },
      {
        "title": "hpesbhf03835en_us",
        "trust": 0.8,
        "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03835en_us"
      },
      {
        "title": "hpesbhf03869en_us",
        "trust": 0.8,
        "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03869en_us"
      },
      {
        "title": "HPE Windows Firmware Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86389"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1322"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-200",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7112"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1041984"
      },
      {
        "trust": 1.6,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03831en_us"
      },
      {
        "trust": 1.6,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03869en_us"
      },
      {
        "trust": 1.6,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03805en_us"
      },
      {
        "trust": 1.6,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03835en_us"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7112"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7112"
      },
      {
        "trust": 0.1,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03805en_us"
      },
      {
        "trust": 0.1,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03831en_us"
      },
      {
        "trust": 0.1,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03835en_us"
      },
      {
        "trust": 0.1,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03869en_us"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1322"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7112"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-137144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1322"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7112"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-12-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137144"
      },
      {
        "date": "2019-03-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      },
      {
        "date": "2018-10-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1322"
      },
      {
        "date": "2018-12-03T15:29:00.383000",
        "db": "NVD",
        "id": "CVE-2018-7112"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137144"
      },
      {
        "date": "2019-03-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      },
      {
        "date": "2020-08-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1322"
      },
      {
        "date": "2024-11-21T04:11:39.753000",
        "db": "NVD",
        "id": "CVE-2018-7112"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1322"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  HPE Information disclosure vulnerabilities in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014231"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1322"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…