A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the "Boot Hole" issue for HPE signed GRUB2 applications.
Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.00108.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Hpe
Subscribe
|
Apollo 2000 Gen10 Plus System
Subscribe
Apollo 4200 Gen10 Server
Subscribe
Apollo 4200 Gen9 Server
Subscribe
Apollo 4510 Gen10 System
Subscribe
Apollo 4520 Chassis
Subscribe
Apollo 6500 Gen10 System
Subscribe
Cloudline Cl2100 Gen10 Server
Subscribe
Cloudline Cl2200 Gen10 Server
Subscribe
Cloudline Cl2600 Gen10 Server
Subscribe
Cloudline Cl2800 Gen10 Server
Subscribe
Cloudline Cl3100 Gen10 Server
Subscribe
Cloudline Cl3100 Gen9 Server
Subscribe
Cloudline Cl3150 Gen10 Server
Subscribe
Cloudline Cl4100 Gen10 Server
Subscribe
Cloudline Cl5200 Gen9 Server
Subscribe
Cloudline Cl5800 Gen9 Server
Subscribe
Intelligent Provisioning
Subscribe
Proliant Bl460c Gen10 Server Blade
Subscribe
Proliant Bl460c Gen8 Blade Server
Subscribe
Proliant Bl460c Gen9 Server Blade
Subscribe
Proliant Bl660c Gen8 Blade Server
Subscribe
Proliant Bl660c Gen9 Server Blade
Subscribe
Proliant Dl120 Gen10 Server
Subscribe
Proliant Dl120 Gen9 Server
Subscribe
Proliant Dl160 Gen10 Server
Subscribe
Proliant Dl160 Gen8 Server
Subscribe
Proliant Dl160 Gen9 Server
Subscribe
Proliant Dl180 Gen10 Server
Subscribe
Proliant Dl180 Gen9 Server
Subscribe
Proliant Dl20 Gen10 Server
Subscribe
Proliant Dl20 Gen9 Server
Subscribe
Proliant Dl325 Gen10 Server
Subscribe
Proliant Dl360 Gen10 Server
Subscribe
Proliant Dl360 Gen9 Server
Subscribe
Proliant Dl360e Gen8 Server
Subscribe
Proliant Dl360p Gen8 Server
Subscribe
Proliant Dl380 Gen10 Server
Subscribe
Proliant Dl380 Gen9 Server
Subscribe
Proliant Dl380e Gen8 Server
Subscribe
Proliant Dl380p Gen8 Server
Subscribe
Proliant Dl385 Gen10 Server
Subscribe
Proliant Dl385p Gen8 Server
Subscribe
Proliant Dl388 Gen9 Server
Subscribe
Proliant Dl560 Gen10 Server
Subscribe
Proliant Dl560 Gen8 Server
Subscribe
Proliant Dl560 Gen9 Server
Subscribe
Proliant Dl580 Gen10 Server
Subscribe
Proliant Dl580 Gen8 Server
Subscribe
Proliant Dl580 Gen9 Server
Subscribe
Proliant Dl60 Gen9 Server
Subscribe
Proliant Dl80 Gen9 Server
Subscribe
Proliant Dx170r Gen10 Server
Subscribe
Proliant Dx190r Gen10 Server
Subscribe
Proliant Dx360 Gen10 Server
Subscribe
Proliant Dx380 Gen10 Server
Subscribe
Proliant Dx385 Gen10 Plus Server
Subscribe
Proliant Dx4200 Gen10 Server
Subscribe
Proliant Dx560 Gen10 Server
Subscribe
Proliant E910 Server Blade
Subscribe
Proliant M510 Server Cartridge
Subscribe
Proliant M710x-l Server Blade
Subscribe
Proliant M710x Server Blade
Subscribe
Proliant M750 Server Blade
Subscribe
Proliant Microserver Gen10
Subscribe
Proliant Microserver Gen10 Plus
Subscribe
Proliant Ml10 Gen9 Server
Subscribe
Proliant Ml110 Gen10 Server
Subscribe
Proliant Ml110 Gen9 Server
Subscribe
Proliant Ml150 Gen9 Server
Subscribe
Proliant Ml30 Gen10 Server
Subscribe
Proliant Ml30 Gen9 Server
Subscribe
Proliant Ml310e Gen8 Server
Subscribe
Proliant Ml350 Gen10 Server
Subscribe
Proliant Ml350 Gen9 Server
Subscribe
Proliant Ml350e Gen8 Server
Subscribe
Proliant Ml350p Gen8 Server
Subscribe
Proliant Se2160w Gen9 Server
Subscribe
Proliant Sl230s Gen8 Server
Subscribe
Proliant Sl250s Gen8 Server
Subscribe
Proliant Sl270s Gen8 Server
Subscribe
Proliant Sl4540 Gen8 Server
Subscribe
Proliant Ws460c Gen8 Graphics Server Blade
Subscribe
Proliant Ws460c Gen9 Graphics Server Blade
Subscribe
Proliant Xl170r Gen10 Server
Subscribe
Proliant Xl170r Gen9 Server
Subscribe
Proliant Xl190r Gen10 Server
Subscribe
Proliant Xl190r Gen9 Server
Subscribe
Proliant Xl220n Gen10 Plus Server
Subscribe
Proliant Xl230a Gen9 Server
Subscribe
Proliant Xl230k Gen10 Server
Subscribe
Proliant Xl250a Gen9 Server
Subscribe
Proliant Xl260a Gen9 Server
Subscribe
Proliant Xl270d Gen10 Server
Subscribe
Proliant Xl270d Gen9 Server
Subscribe
Proliant Xl270d Gen9 Special Server
Subscribe
Proliant Xl290n Gen10 Plus Server
Subscribe
Proliant Xl2x260w Gen10 Server
Subscribe
Proliant Xl450 Gen10 Server
Subscribe
Proliant Xl450 Gen9 Server
Subscribe
Proliant Xl730f Gen9 Server
Subscribe
Proliant Xl740f Gen9 Server
Subscribe
Proliant Xl750f Gen9 Server
Subscribe
Proliant Xl925g Gen10 Plus 1u 4-node Configure-to-order Server
Subscribe
Service Pack For Proliant
Subscribe
Simplivity 2600 Gen10
Subscribe
Simplivity 325 Gen10
Subscribe
Simplivity 380 Gen10
Subscribe
Smartstart Scripting Toolkit
Subscribe
Storeeasy 1000 Storage Gen10
Subscribe
Storeeasy 1000 Storage Gen9
Subscribe
Synergy 480 Gen10 Compute Module
Subscribe
Synergy 480 Gen10 Plus Compute Module
Subscribe
Synergy 480 Gen9 Compute Module
Subscribe
Synergy 620 Gen9 Compute Module
Subscribe
Synergy 660 Gen10 Compute Module
Subscribe
Synergy 660 Gen9 Compute Module
Subscribe
Synergy 680 Gen9 Compute Module
Subscribe
Synergy D3940 Storage Module
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
No data.
No data.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28339 | A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the "Boot Hole" issue for HPE signed GRUB2 applications. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2024-08-04T09:25:48.501Z
Reserved: 2020-01-16T00:00:00
Link: CVE-2020-7205
No data.
Status : Modified
Published: 2020-07-30T18:15:11.737
Modified: 2024-11-21T05:36:49.470
Link: CVE-2020-7205
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD