Unknown
CVE-2020-7207
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-7207
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A local elevation of privilege using physical access security vulnerability was found in HPE Proliant Gen10 Servers using Intel Innovation Engine (IE). This attack requires a physical attack to the server motherboard. To mitigate this issue, ensure your server is always physically secured. HPE will not address this issue in the impacted Gen 10 servers listed. HPE recommends using appropriate physical security methods as a compensating control to disallow an attacker from having physical access to the server main circuit board.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- apollo 2000 firmware -,
- apollo 4200 gen10 firmware -,
- apollo 4500 firmware -,
- proliant bl460c gen10 firmware -,
- proliant dl120 gen10 firmware -,
- proliant dl160 gen10 firmware -,
- proliant dl180 gen10 firmware -,
- proliant dl360 gen10 firmware -,
- proliant dl380 gen10 firmware -,
- proliant dl560 gen10 firmware -,
- proliant dl580 gen10 firmware -,
- proliant e910 firmware -,
- proliant ml110 gen10 firmware -,
- proliant ml350 gen10 firmware -,
- proliant xl170r gen10 firmware -,
- proliant xl190r gen10 firmware -,
- proliant xl230k gen10 firmware -,
- proliant xl270d gen10 firmware -,
- proliant xl450 gen10 firmware -,
- synergy 480 gen10 firmware -,
- synergy 660 gen10 firmware -
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: