Metrics
No CVSS v4.0
Attack Vector Physical
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.00081.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Hp
Subscribe
|
Elite Dragonfly
Subscribe
Elite Dragonfly Firmware
Subscribe
Elite X2 G4
Subscribe
Elite X2 G4 Firmware
Subscribe
Elitebook 830 G6
Subscribe
Elitebook 830 G6 Firmware
Subscribe
Elitebook 836 G6
Subscribe
Elitebook 836 G6 Firmware
Subscribe
Elitebook 840 G6
Subscribe
Elitebook 840 G6 Firmware
Subscribe
Elitebook 840 G6 Healthcare Edition
Subscribe
Elitebook 840 G6 Healthcare Edition Firmware
Subscribe
Elitebook 846 G6
Subscribe
Elitebook 846 G6 Firmware
Subscribe
Elitebook 846 G6 Healthcare Edition
Subscribe
Elitebook 846 G6 Healthcare Edition Firmware
Subscribe
Elitebook 850 G6
Subscribe
Elitebook 850 G6 Firmware
Subscribe
Elitebook X360 1030 G4
Subscribe
Elitebook X360 1030 G4 Firmware
Subscribe
Elitebook X360 1040 G6
Subscribe
Elitebook X360 1040 G6 Firmware
Subscribe
Elitebook X360 830 G6
Subscribe
Elitebook X360 830 G6 Firmware
Subscribe
Elitedesk 800 G5 Dm
Subscribe
Elitedesk 800 G5 Dm Firmware
Subscribe
Elitedesk 800 G5 Sff
Subscribe
Elitedesk 800 G5 Sff Firmware
Subscribe
Elitedesk 800 G5 Twr
Subscribe
Elitedesk 800 G5 Twr Firmware
Subscribe
Eliteone 800 G5 Aio
Subscribe
Eliteone 800 G5 Aio Firmware
Subscribe
Probook 640 G5
Subscribe
Probook 640 G5 Firmware
Subscribe
Probook 650 G5
Subscribe
Probook 650 G5 Firmware
Subscribe
Prodesk 400 G5 Dm
Subscribe
Prodesk 400 G5 Dm Firmware
Subscribe
Prodesk 400 G6 Mt
Subscribe
Prodesk 400 G6 Mt Firmware
Subscribe
Prodesk 400 G6 Sff
Subscribe
Prodesk 400 G6 Sff Firmware
Subscribe
Prodesk 480 G6 Mt
Subscribe
Prodesk 480 G6 Mt Firmware
Subscribe
Prodesk 600 G5 Dm
Subscribe
Prodesk 600 G5 Dm Firmware
Subscribe
Prodesk 600 G5 Mt
Subscribe
Prodesk 600 G5 Mt Firmware
Subscribe
Prodesk 600 G5 Pci Mt
Subscribe
Prodesk 600 G5 Pci Mt Firmware
Subscribe
Prodesk 600 G5 Sff
Subscribe
Prodesk 600 G5 Sff Firmware
Subscribe
Proone 400 G5 Aio
Subscribe
Proone 400 G5 Aio Firmware
Subscribe
Proone 440 G5 Aio
Subscribe
Proone 440 G5 Aio Firmware
Subscribe
Proone 600 G5 Aio
Subscribe
Proone 600 G5 Aio Firmware
Subscribe
Zbook 14u G6 Mobile Workstation
Subscribe
Zbook 14u G6 Mobile Workstation Firmware
Subscribe
Zbook 15u G6 Mobile Workstation
Subscribe
Zbook 15u G6 Mobile Workstation Firmware
Subscribe
Zbook 17u G6 Mobile Workstation
Subscribe
Zbook 17u G6 Mobile Workstation Firmware
Subscribe
Zhan X 13 G2
Subscribe
Zhan X 13 G2 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-8591 | A potential security vulnerability with pre-boot DMA may allow unauthorized UEFI code execution using open-case attacks. This industry-wide issue requires physically accessing internal expansion slots with specialized hardware and software tools to modify UEFI code in memory. This affects HP Intel-based Business PCs that support Microsoft Windows 10 Kernel DMA protection. Affected versions depend on platform (prior to 01.04.02; or prior to 02.04.01; or prior to 02.04.02). |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://support.hp.com/us-en/document/c06549501 |
|
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hp
Published:
Updated: 2024-08-05T02:02:39.823Z
Reserved: 2019-11-12T00:00:00
Link: CVE-2019-18913
No data.
Status : Modified
Published: 2020-01-31T04:15:10.993
Modified: 2024-11-21T04:33:49.720
Link: CVE-2019-18913
No data.
OpenCVE Enrichment
No data.
EUVD