Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

HP Patches UEFI Vulnerabilities Affecting Over 200 Computers

HP on Wednesday announced the release of patches for two high-severity vulnerabilities that impact the UEFI firmware of more than 200 laptops, workstations, and other products.

HP on Wednesday announced the release of patches for two high-severity vulnerabilities that impact the UEFI firmware of more than 200 laptops, workstations, and other products.

The two vulnerabilities are tracked as CVE-2021-3808 and CVE-2021-3809 and have a CVSS score of 8.8. HP has credited Nicholas Starke of Aruba Threat Labs and a researcher who uses the online moniker “yngweijw” for reporting these bugs, but did not provide technical information on either of the flaws.

However, the company did share a list of impacted products, which includes numerous business notebooks and desktop PCs, as well as desktop workstations, retail point-of-sale devices, and thin client PCs.

“Potential security vulnerabilities have been identified in the BIOS (UEFI Firmware) for certain HP PC products, which might allow arbitrary code execution. HP is releasing firmware updates to mitigate these potential vulnerabilities,” HP notes in its advisory.

[ READ: Firmware Flaws Allow Disabling Secure Boot on Lenovo Laptops ]

According to Starke, HP needed roughly six months to address CVE-2021-3809, the vulnerability he reported.

The security defect, he explains, is related to an SMI (System Management Interrupt) handler that calls out from System Management Mode (SMM), a highly privileged execution mode of x86 processors.

Starke claims that the SMI handler “can be triggered from a kernel execution context such as a Windows Kernel Driver,” which would allow an attacker to find the memory address of a specific function and overwrite it in physical memory so that it would point to attacker code.

Advertisement. Scroll to continue reading.

“This vulnerability could allow an attacker executing with kernel-level privileges (CPL == 0) to escalate privileges to System Management Mode (SMM). Executing in SMM gives an attacker full privileges over the host to further carry out attacks,” Starke says.

While firmware updates are already available for most of the affected devices, a few of them have yet to receive patches. Users should read HP’s advisory for further details on impact and updates.

This week, HP also published advisories to detail patches that Intel has released to resolve multiple firmware and software vulnerabilities affecting its processors and chipsets, and which impact HP products as well.

Related: 16 Vulnerabilities Found in Firmware of HP Enterprise Devices

Related: High-Severity UEFI Vulnerabilities Patched in Dell Enterprise Laptops

Related: Two Dozen UEFI Vulnerabilities Impact Millions of Devices From Major Vendors

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

The US arm of networking giant TP-Link has appointed Adam Robertson as Director of Information and Security.

Raj Dodhiawala has been named Chief Product Officer at Eclypsium.

Cyber exposure management firm Armis has promoted Alex Mosher to President.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.