Unknown
CVE-2022-43779
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-43779
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in certain HP PC products using AMI UEFI Firmware (system BIOS) which might allow arbitrary code execution, denial of service, and information disclosure. AMI has released updates to mitigate the potential vulnerability.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- 218 pro g5 mt firmware,
- 260 g2 desktop mini firmware,
- 260 g3 desktop mini firmware,
- 260 g4 desktop mini firmware,
- 280 g3 microtower pc firmware,
- 280 g3 pci microtower pc firmware,
- 288 pro g3 microtower pc firmware,
- 290 g1 microtower firmware,
- 348 g4 firmware,
- desktop pro 300 g3 firmware,
- desktop pro a 300 g3 firmware,
- desktop pro a g2 firmware,
- desktop pro a g2 microtower firmware,
- desktop pro a g3 firmware,
- desktop pro a g3 microtower firmware,
- desktop pro g3 firmware,
- desktop pro g3 microtower firmware,
- desktop pro microtower firmware,
- rp2 retail system 2000 firmware,
- rp2 retail system 2020 firmware,
- rp2 retail system 2030 firmware,
- zhan 66 pro a g1 microtower firmware,
- zhan 66 pro a g1 r microtower firmware,
- zhan 66 pro g1 r microtower firmware,
- zhan 86 pro g1 microtower firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: