Attacker Value
Unknown
0
CVE-2023-26300
0
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-26300
(Last updated November 01, 2023) ▾
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
A potential security vulnerability has been identified in the system BIOS for certain HP PC products which might allow escalation of privilege. HP is releasing firmware updates to mitigate the potential vulnerability.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
7.8 High
Impact Score:
5.9
Exploitability Score:
1.8
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
HP PC products not down converted
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
Products
- 200 g4 22 all-in-one pc (rom family ssid 86f0) firmware,
- 200 g4 22 all-in-one pc (rom family ssid 86f2) firmware,
- 200 g4 22 all-in-one pc (rom family ssid 86f3) firmware,
- 200 pro g4 22 all-in-one pc (rom family ssid 86f0) firmware,
- 200 pro g4 22 all-in-one pc (rom family ssid 86f2) firmware,
- 200 pro g4 22 all-in-one pc (rom family ssid 86f3) firmware,
- 205 g4 22 all-in-one pc (rom family ssid 86f0) firmware,
- 205 g4 22 all-in-one pc (rom family ssid 86f2) firmware,
- 205 g4 22 all-in-one pc (rom family ssid 86f3) firmware,
- 205 g8 24 all-in-one pc (rom family ssid 8923) firmware,
- 205 g8 24 all-in-one pc (rom family ssid 8924) firmware,
- 205 pro g4 22 all-in-one pc (rom family ssid 86f0) firmware,
- 205 pro g4 22 all-in-one pc (rom family ssid 86f2) firmware,
- 205 pro g4 22 all-in-one pc (rom family ssid 86f3) firmware,
- 205 pro g8 24 all-in-one pc (rom family ssid 8923) firmware,
- 205 pro g8 24 all-in-one pc (rom family ssid 8924) firmware,
- 240 g10 firmware,
- 240 g6 firmware,
- 240 g7 firmware,
- 240 g9 firmware,
- 245 firmware,
- 245 g10 firmware,
- 245 g7 firmware,
- 245 g8 firmware,
- 245 g9 firmware,
- 246 g6 firmware,
- 246 g7 firmware,
- 247 g8 firmware,
- 250 g10 firmware,
- 250 g6 firmware,
- 250 g7 firmware,
- 250 g9 firmware,
- 255 g10 firmware,
- 255 g6 firmware,
- 255 g7 firmware,
- 255 g8 (rom family ssid 87d1) firmware,
- 255 g8 (rom family ssid 8905) firmware,
- 255 g8 (rom family ssid 890e) firmware,
- 255 g8 firmware,
- 255 g9 firmware,
- 256 g6 firmware,
- 256 g7 firmware,
- 258 g6 firmware,
- 258 g7 firmware,
- 285 g6 microtower (rom family ssid 871e) firmware,
- 285 g8 microtower (rom family ssid 870e) firmware,
- 285 pro g6 microtower (rom family ssid 871e) firmware,
- 285 pro g8 microtower (rom family ssid 870e) firmware,
- 295 g8 microtower (rom family ssid 870e) firmware,
- 340 g7 firmware,
- 348 g7 firmware,
- 470 g10 firmware,
- 470 g7 firmware,
- 470 g9 firmware,
- desktop pro a 300 g3 firmware,
- desktop pro a g3 firmware,
- desktop pro a g3 microtower firmware,
- pro sff 280 g9 desktop (rom family ssid 89b4) firmware,
- pro sff 280 g9 desktop (rom family ssid 8bc3) firmware,
- pro sff 290 g9 desktop (rom family ssid 89b4) firmware,
- pro sff 290 g9 desktop (rom family ssid 8bc3) firmware,
- pro sff zhan 66 g9 desktop (rom family ssid 89b4) firmware,
- pro sff zhan 66 g9 desktop (rom family ssid 8bc3) firmware,
- pro tower 200 g9 desktop (rom family ssid 89b3) firmware,
- pro tower 200 g9 desktop (rom family ssid 89b4) firmware,
- pro tower 200 g9 desktop (rom family ssid 8bc3) firmware,
- pro tower 280 g9 desktop (rom family ssid 89b3) firmware,
- pro tower 280 g9 desktop (rom family ssid 89b4) firmware,
- pro tower 290 g9 desktop (rom family ssid 89b3) firmware,
- pro tower 290 g9 desktop (rom family ssid 89b4) firmware,
- pro tower 290 g9 desktop (rom family ssid 8bc3) firmware,
- pro tower zhan 99 g9 desktop (rom family ssid 89b3) firmware,
- pro tower zhan 99 g9 desktop (rom family ssid 89b4) firmware,
- pro tower zhan 99 g9 desktop (rom family ssid 8b3c) firmware,
- proone 240 g10 (rom family ssid 8b4c) firmware,
- proone 240 g10 (rom family ssid 8b4d) firmware,
- proone 240 g9 (rom family ssid 89eb) firmware,
- stream 11 pro g4 firmware,
- stream 11 pro g5 firmware,
- t638 thin client firmware,
- vr backpack g2 (rom family ssid 8590) firmware,
- zbook 15 g5 mobile workstation firmware,
- zhan 66 pro a g1 r microtower firmware,
- zhan 66 pro a g10 (rom family ssid 8b4e) firmware,
- zhan 66 pro a g4 all-in-one pc (rom family ssid 8923) firmware,
- zhan 66 pro a g4 all-in-one pc (rom family ssid 8924) firmware,
- zhan 99 g3 mobile workstation firmware,
- zhan 99 g4 mobile workstation firmware,
- zhan 99 pro a g2 microtower (rom family ssid 871e) firmware
References
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: