Potential security vulnerabilities have been identified in the BIOS (UEFI Firmware) for certain HP PC products
A vulnerability has been
discovered in certain HP PC BIOS, which could allow for local arbitrary
code execution. The BIOS is a firmware which is used to provide runtime services
for operating systems and programs and to perform hardware initialization
during the booting process. Successful exploitation of this vulnerability
could allow for local arbitrary code execution with kernel level
privileges. An attacker could then install programs; view, change, or
delete data; or create new accounts with full user rights.
A proof-of-concept writeup was
posted to GitHub on May 10, 2022. However, there are no reports of active exploitation
of the vulnerability.
This vulnerability is found in the BIOS of numerous HP systems. For a full
list of affected systems and BIOS versions, please click here:
- Large and medium government
- Small government entities: High
- Large and medium business
entities: High - Small business entities: High
Home Users: Low
This vulnerability is exploited by
taking advantage of System Management Interrupt Handler (SMI Handler)’s
functionality to execute code from overwritten memory. The CVEs associated
with this vulnerability are: CVE-2021-3808 and CVE-2021-3809.
We recommend the following
actions be taken:
the latest version of the BIOS for systems affected.
software as a non-privileged user (one without administrative
privileges) to diminish the effects of a successful attack.