ID

VAR-201508-0204


CVE

CVE-2015-5367


TITLE

plural HP Run on device HP lt4112 LTE/HSPA+ Gobi 4G Vulnerability gained in module firmware

Trust: 0.8

sources: JVNDB: JVNDB-2015-004498

DESCRIPTION

The HP lt4112 LTE/HSPA+ Gobi 4G module with firmware before 12.500.00.15.1803 on EliteBook, ElitePad, Elite, ProBook, Spectre, ZBook, and mt41 Thin Client devices allows local users to gain privileges via unspecified vectors. Huawei ME906 is a mobile Internet module using M.2, which supports LTE, WCDMA, EVDO and GSM. A variety of Huawei ME906 products contain a hash of the root account and password, allowing an attacker to exploit the vulnerability to crack the ROOT account password information. Multiple Huawei ME906 products are prone to a local information-disclosure vulnerability. A local attacker can exploit this issue to obtain sensitive information; this may lead to further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04773272 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04773272 Version: 1 HPSBHF03408 rev.1 - HP PCs with HP lt4112 LTE/HSPA+ Gobi 4G Module, Remote Execution of Arbitrary Code NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-08-26 Last Updated: 2015-08-26 Potential Security Impact: Remote execution of arbitrary code Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in certain HP notebook PCs with the HP lt4112 LTE/HSPA+ Gobi 4G Module. The vulnerabilities could be exploited remotely to allow execution of arbitrary code. References: CVE-2015-5367 CVE-2015-5368 SSRT101965 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Affected Products HP EliteBook 820 G1 HP EliteBook 820 G2 HP EliteBook 825 G2 HP EliteBook 840 G1 HP EliteBook 840 G2 HP EliteBook 845 G1 HP EliteBook 850 G1 HP EliteBook 850 G2 HP EliteBook 855 G1 HP EliteBook 1040 G1 HP EliteBook 1040 G2 HP EliteBook Folio 9470m HP EliteBook Revolve 810 G2 HP EliteBook Revolve 810 G3 HP ElitePad 1000 G2 HP Elite x2 1010 G2 HP ProBook 430 G1 HP ProBook 430 G2 HP ProBook 440 G0 HP ProBook 440 G1 HP ProBook 440 G2 HP ProBook 450 G0 HP ProBook 450 G1 HP ProBook 450 G2 HP ProBook 640 G1 HP ProBook 645 G1 HP ProBook 650 G1 HP ProBook 655 G1 HP ProBook x2 620 G1 HP Spectre x2 13-SMB Pro HP ZBook 14 HP ZBook 14 G2 HP ZBook 15 HP ZBook 15 G2 HP ZBook 15u HP ZBook 17 HP Zbook 17 G2 mt41 Thin Client BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-5367 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9 CVE-2015-5368 (AV:N/AC:M/Au:N/C:N/I:P/A:C) 7.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 The Hewlett-Packard Company thanks Mickey Shkatov and Jesse Michael from the Advanced Threat Research team at Intel Security for reporting this issue to security-alert@hp.com. To acquire the firmware updates, go to hp.com Select "Support" and then "Download Drivers" Enter your product name or number in the "Find my product" field. Choose the product from the returned search Choose the operating system Under the Download Index, select Firmware, and download the 12.500.00.15.1803 firmware or later (HP Softpaq # SP72435 or later). Follow the installation instructions to install the firmware update. HISTORY Version:1 (rev.1) - 26 August 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAlXeOCQACgkQ4B86/C0qfVnaKACgpr0U2CGyIfHCX5LAbOL44pVk f+oAn1yEGVjeLdq+Q2Wi+MSUjtC5SiQJ =/02r -----END PGP SIGNATURE-----

Trust: 2.61

sources: NVD: CVE-2015-5367 // JVNDB: JVNDB-2015-004498 // CNVD: CNVD-2015-05523 // BID: 76171 // PACKETSTORM: 133341 // PACKETSTORM: 133528

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-05523

AFFECTED PRODUCTS

vendor:hpmodel:lt4112 ltescope:eqversion:12.500.00.15.1802

Trust: 1.6

vendor:hpmodel:hspa\+ gobi 4gscope:eqversion:12.500.00.15.1802

Trust: 1.6

vendor:hpmodel:elitebook 825 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 440 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook revolve 810 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:mt41 thin clientscope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 645 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 655 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 450 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook 1040 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:zbook 14 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:spectre x2 13-smb proscope:eqversion:*

Trust: 1.0

vendor:hpmodel:zbook 15 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:zbook 17 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 430 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:zbook 14scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook 820 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook 845 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook 855 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook x2 620 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elite x2 1010 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook 840 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 440 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook 850 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 450 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook 840 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook 850 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook 1040 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:zbook 15uscope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 640 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitepad 1000 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook folio 9470mscope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 450 g0scope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 440 g0scope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 430 g2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:probook 650 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook 820 g1scope:eqversion:*

Trust: 1.0

vendor:hpmodel:zbook 15scope:eqversion:*

Trust: 1.0

vendor:hpmodel:elitebook revolve 810 g2scope:eqversion:*

Trust: 1.0

vendor:hewlett packardmodel:hp elite x2 1010 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 1040 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 1040 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 820 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 820 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 825 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 840 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 840 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 845 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 850 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 850 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 855 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook folio 9470mscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook revolve 810 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook revolve 810 g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitepad 1000 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp lt4112 lte/hspa+ gobi 4gscope:ltversion:12.500.00.15.1803

Trust: 0.8

vendor:hewlett packardmodel:hp probook 430 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 430 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 440 g0scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 440 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 440 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 450 g0scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 450 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 450 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 640 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 645 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 650 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook 655 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp probook x2 620 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp spectre x2 13-smb proscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook 14scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook 14 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook 15scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook 15 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook 15uscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook 17scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook 17 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:mt41 thin clientscope: - version: -

Trust: 0.8

vendor:huaweimodel:me906scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2015-05523 // JVNDB: JVNDB-2015-004498 // CNNVD: CNNVD-201508-126 // NVD: CVE-2015-5367

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5367
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-5367
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-05523
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201508-126
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2015-5367
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-05523
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2015-05523 // JVNDB: JVNDB-2015-004498 // CNNVD: CNNVD-201508-126 // NVD: CVE-2015-5367

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.8

sources: JVNDB: JVNDB-2015-004498 // NVD: CVE-2015-5367

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201508-126

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201508-126

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004498

PATCH

title:HPSBHF03408url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04773272

Trust: 0.8

title:Patches for various Huawei ME906 product information disclosure vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/62878

Trust: 0.6

sources: CNVD: CNVD-2015-05523 // JVNDB: JVNDB-2015-004498

EXTERNAL IDS

db:NVDid:CVE-2015-5367

Trust: 3.5

db:BIDid:76171

Trust: 1.9

db:SECTRACKid:1033414

Trust: 1.0

db:JVNDBid:JVNDB-2015-004498

Trust: 0.8

db:CNVDid:CNVD-2015-05523

Trust: 0.6

db:CNNVDid:CNNVD-201508-126

Trust: 0.6

db:PACKETSTORMid:133341

Trust: 0.1

db:PACKETSTORMid:133528

Trust: 0.1

sources: CNVD: CNVD-2015-05523 // BID: 76171 // JVNDB: JVNDB-2015-004498 // PACKETSTORM: 133341 // PACKETSTORM: 133528 // CNNVD: CNNVD-201508-126 // NVD: CVE-2015-5367

REFERENCES

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773272

Trust: 1.6

url:http://www.securityfocus.com/bid/76171

Trust: 1.6

url:http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446601.htm

Trust: 1.0

url:http://www.securitytracker.com/id/1033414

Trust: 1.0

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773272

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5367

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5367

Trust: 0.8

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446601.htm

Trust: 0.6

url:http://www.huawei.com

Trust: 0.3

url:http://seclists.org/bugtraq/2015/aug/148

Trust: 0.3

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-446601.htm

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.2

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-5368

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-5367

Trust: 0.2

sources: CNVD: CNVD-2015-05523 // BID: 76171 // JVNDB: JVNDB-2015-004498 // PACKETSTORM: 133341 // PACKETSTORM: 133528 // CNNVD: CNNVD-201508-126 // NVD: CVE-2015-5367

CREDITS

Mickey Shkatov from Intel Advanced Threat Research Team and Jesse Michael from Intel

Trust: 0.9

sources: BID: 76171 // CNNVD: CNNVD-201508-126

SOURCES

db:CNVDid:CNVD-2015-05523
db:BIDid:76171
db:JVNDBid:JVNDB-2015-004498
db:PACKETSTORMid:133341
db:PACKETSTORMid:133528
db:CNNVDid:CNNVD-201508-126
db:NVDid:CVE-2015-5367

LAST UPDATE DATE

2024-11-23T22:34:57.151000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-05523date:2015-08-24T00:00:00
db:BIDid:76171date:2015-11-03T19:19:00
db:JVNDBid:JVNDB-2015-004498date:2015-08-31T00:00:00
db:CNNVDid:CNNVD-201508-126date:2015-08-28T00:00:00
db:NVDid:CVE-2015-5367date:2024-11-21T02:32:53.530

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-05523date:2015-08-24T00:00:00
db:BIDid:76171date:2015-08-05T00:00:00
db:JVNDBid:JVNDB-2015-004498date:2015-08-31T00:00:00
db:PACKETSTORMid:133341date:2015-08-27T13:13:00
db:PACKETSTORMid:133528date:2015-09-15T04:46:15
db:CNNVDid:CNNVD-201508-126date:2015-08-13T00:00:00
db:NVDid:CVE-2015-5367date:2015-08-27T15:59:00.140