Unknown
CVE-2019-16284
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-16284
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A potential security vulnerability has been identified in multiple HP products and versions which involves possible execution of arbitrary code during boot services that can result in elevation of privilege. The EFI_BOOT_SERVICES structure might be overwritten by an attacker to execute arbitrary SMM (System Management Mode) code. A list of affected products and versions are available in https://support.hp.com/rs-en/document/c06456250.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- 260 g1 dm firmware,
- 280 pro g1 firmware,
- 285 g2 firmware,
- 340 g3 firmware,
- 340 g4 firmware,
- 346 g3 firmware,
- 346 g4 firmware,
- 348 g3 firmware,
- 348 g4 firmware,
- elite slice firmware,
- elite x2 1011 g1 firmware,
- elite x2 1012 g1 firmware,
- elitebook 1030 g1 firmware,
- elitebook 1040 g2 firmware,
- elitebook 720 g1 firmware,
- elitebook 720 g2 firmware,
- elitebook 740 g1 firmware,
- elitebook 740 g2 firmware,
- elitebook 750 g1 firmware,
- elitebook 750 g2 firmware,
- elitebook 820 g1 firmware,
- elitebook 820 g2 firmware,
- elitebook 820 g3 firmware,
- elitebook 828 g3 firmware,
- elitebook 840 g1 firmware,
- elitebook 840 g2 firmware,
- elitebook 840 g3 firmware,
- elitebook 848 g3 firmware,
- elitebook 850 g1 firmware,
- elitebook 850 g2 firmware,
- elitebook 850 g3 firmware,
- elitebook folio 1020 g1 firmware,
- elitebook folio 1040 g1 firmware,
- elitebook folio 1040 g3 firmware,
- elitebook folio 9480m firmware,
- elitebook folio g1 firmware,
- elitebook revolve 810 g2 firmware,
- elitebook revolve 810 g3 firmware,
- elitedesk 800 g2 dm firmware,
- elitedesk 800 g2 sff firmware,
- elitedesk 800 g2 twr firmware,
- eliteone 800 g2 aio firmware,
- elitepad 1000 g2 firmware,
- mp9 g2 retail system firmware,
- pro tablet 10 ee g1 firmware,
- pro tablet 608 g1 firmware,
- pro tablet 610 g1 firmware,
- pro x2 612 g1 firmware,
- probook 11 g1 firmware,
- probook 11 g2 firmware,
- probook 430 g1 firmware,
- probook 430 g2 firmware,
- probook 430 g3 firmware,
- probook 440 g1 firmware,
- probook 440 g2 firmware,
- probook 440 g3 firmware,
- probook 450 g1 firmware,
- probook 450 g2 firmware,
- probook 450 g3 firmware,
- probook 470 g1 firmware,
- probook 470 g2 firmware,
- probook 470 g3 firmware,
- probook 640 g1 firmware,
- probook 640 g2 firmware,
- probook 650 g1 firmware,
- probook 650 g2 firmware,
- probook x360 11 g1 firmware,
- prodesk 400 g1 dm firmware,
- prodesk 400 g2 dm firmware,
- prodesk 400 g2.5 sff firmware,
- prodesk 400 g3 sff firmware,
- prodesk 405 g2 mt firmware,
- prodesk 480 g3 sff firmware,
- prodesk 485 g2 mt firmware,
- prodesk 490 g2 mt firmware,
- prodesk 490 g3 sff firmware,
- prodesk 498 g2 mt firmware,
- prodesk 498 g3 sff firmware,
- prodesk 600 g2 dm firmware,
- prodesk 600 g2 sff firmware,
- proone 400 g2 aio firmware,
- proone 600 g2 aio firmware,
- rp2 retail system firmware,
- rp9 g1 retail system 9015 firmware,
- rp9 g1 retail system 9018 firmware,
- sprout pro firmware,
- z1 g3 firmware,
- z2 mini g3 firmware,
- z238 microtower firmware,
- z240 sff firmware,
- z240 tower firmware,
- zbook 14 firmware,
- zbook 14 g2 firmware,
- zbook 15 firmware,
- zbook 15 g2 firmware,
- zbook 15 g3 firmware,
- zbook 15u g2 firmware,
- zbook 15u g3 firmware,
- zbook 17 firmware,
- zbook 17 g2 firmware,
- zbook 17 g3 firmware,
- zbook studio g3 firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: