ID

VAR-201603-0040


CVE

CVE-2016-2243


TITLE

specific HP Commercial PC 2015 Run on Sure Start Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-001709

DESCRIPTION

Sure Start on HP Commercial PCs 2015 allows local users to cause a denial of service (BIOS recovery failure) by leveraging administrative access. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. HP ZBook, etc. ZBook is a set of mobile workstations (high-performance mobile computers); HP EliteBook Folio 1000/800/700 Series are all commercial computer products; HP Z240 Tower/Z240 SFF/Z238 Microtower Workstation N51 are workstations (high-performance computers). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05012469 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05012469 Version: 1 HPSBHF03439 rev.1 - HP Commercial PCs with Sure Start, Local Denial of Service NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-02-25 Last Updated: 2016-02-26 Potential Security Impact: Denial of Service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY HP has identified a potential security vulnerability with the Sure Start implementation on certain 2015 commercial platforms. This vulnerability could be exploited locally by administrator or root level privileges and if compromised, the Sure Start systems could fail to recover the BIOS. References: * CVE-2016-2243 * PSRT110027 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Commercial Notebook, Desktop, and Workstation versions See the tables in the vulnerability resolution for the impacted products. BACKGROUND For a PGP signed version of this security bulletin please write to: security-alert@hp.com For a PGP signed version of this security bulletin please write to: hp-security-alert@hp.com CVSS 2.0 Base Metrics ================================================================================ Reference Base Vector Base Score CVE-2016-2243 (AV:L/AC:L/Au:N/C:P/I:C/A:P) 6.1 ================================================================================ Information on CVSS is documented in HP Customer Notice: HPSN2008002. RESOLUTION HP has made the following product updates available for the impacted products. To acquire the firmware updates, go to http://www.hp.com 1. Select Support and then Download Drivers. 2. Enter your product name or number in the Find my product field. 3. Choose the product from the returned search. 4. Choose the operating system. 5. Under the Download Index, select BIOS, and download the BIOS version as listed in the table below. Follow the installation instructions to install the firmware update. Series Product name BIOS Version Win Softpaq ZBook HP ZBook 15 G3 & ZBook 17 G3 1.03 SP74756 ZBook HP ZBook 15u G3 1.03 SP74756 ZBook HP ZBook Studio G3 1.04 SP74757 1000 Series HP EliteBook Folio 1040 G3 1.01 SP74768 1000 Series HP EliteBook Folio 1012 x2 G2 1.1 SP74770 1000 Series HP EliteBook 840 G3 1.04 SP74748 1000 Series HP EliteBook 850 G3 1.04 SP74748 1000 Series HP EliteBook 820 G3 1.04 SP74748 700 series HP Elitebook 745 G3 1.08 SP74691 700 series HP Elitebook 755 G3 1.08 SP74691 700 series HP Elitebook 725 G3 1.08 SP74691 700 series HP mt42 Mobile Thin Client 1.05 SP74761 800 series HP EliteDesk 800 G2 TWR 2.09 SP74661 800 series HP EliteDesk 800 G2 DM 2.1 SP74666 800 series HP mp9 G2 Retail System 2.1 SP74666 800 series HP EliteDesk 800 SFF 2.09 SP74661 800 series HP EliteOne 800 G2 23-in T/NT 2.1 SP74680 700 series HP EliteDesk 705 G2 MT/SFF 2.09 SP74655 700 series HP EliteDesk 705 G2 DM 2.05 SP74677 700 series HP EliteOne 705 G2 23in AiO T/NT 2.07 SP74686 Product name BIOS Version Win Softpaq Linux Softpaq HP Z240 Tower Workstation N51 01.11 SP74759 SP74760 HP Z240 SFF Workstation N51 01.11 SP74759 SP74760 HP Z238 Microtower Workstation N51 01.11 SP74759 SP74760 System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." REVISION HISTORY Version:1 (rev.1) 10 February 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send email to hpsecurityalert@hp.com Report: To report a potential security vulnerability with any HP supported product, send email to: hpsecurityalert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://support.hp.com/us/en/subscribe/ Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ secBullArchive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. PI = HP Printing and Imaging HF = HP Hardware and Firmware ST = HP Storage Software GN = HP General Software Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: hp-security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the securityalert PGP key, please send an email message as follows: To: hpsecurityalert@hp.com Subject: get key Products: HP ZBook 15 G3 & ZBook 17 G3, HP ZBook 15u G3, HP ZBook Studio G3, HP EliteBook Folio 1040 G3, HP EliteBook Folio 1012 x2 G2, HP EliteBook 840 G3, HP EliteBook 850 G3, HP EliteBook 820 G3, H Elitebook 745 G3, HP Elitebook 755 G3, HP Elitebook 725 G3, HP mt42 Mobile Thin Client, HP EliteDesk 8, HP Z240 Tower Workstation N51, HP Z240 SFF Workstation N51, HP Z238 Microtower Workstation N51 Copyright 2016 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJW2LawAAoJEPRuzn0I+N3ZlBQP/iZAxEvLMV62tYPB9zLr//rW 1vK8FkjwQfEuVqL4L6t1kOg8nw9jV/BEh2pYLf94J2LBhFVLJLis7wQhgLZA5ZHa L4Qu1w9QaLjRod74Un2dFXJCYe9Hdqwrk/cAGsTKOg95jaC/IMmULsxIVZoRXtdg d0k0FP2KJjh5qMfDFJSinGn0rmLuVQAzftJ1di2C9/xZ1RLGDId/znZVIrUgzsc2 ngqCVkcxT+0IvngY3vo22mbCv4woZtgR2hIV/FbMOXGOKF0Rj1pWpW5RAYy2aIir /9kT/6RA3+3HLGklROBBwsBarkoo/iUtGeXOLLMCFqn4fxmQLZv4/QqgGHhE8Dll NYwWkJjN1eCc6JsTsV0fny05kS3XDAPY3O1pSohVqgeagn4Ajn1f2FzwgQxOXQZR HPU/29jOs/UwWl5pBkhLX/DiCbIr+VxHCgRGXHKFeCFjFVW4vZcyLwF15H8jdeXq +KNGC8gNdlGeJljBfqBPebws3Iiha8yq+4AvSFI3U6VWozOgRf0WFTqO7r9fiCe9 pYubR8komb7uAzX6jGYkfjIU4Y2ya+l2YKH1snr2TELXYVv6Hf68zYzwCtxdBvGV N78pM4OcvAkurqIaW5skyjVVp2VWc5IZpN9wLmnzj8mj/75yRdbajYndH4x74gXi Mz+Ss7PPSnhjGvCLKb1P =Ftsm -----END PGP SIGNATURE-----

Trust: 1.8

sources: NVD: CVE-2016-2243 // JVNDB: JVNDB-2016-001709 // VULHUB: VHN-91062 // PACKETSTORM: 136085

AFFECTED PRODUCTS

vendor:hpmodel:elitebook folio 1012 x2 g2scope:eqversion: -

Trust: 1.6

vendor:hpmodel:1000 seriesscope:eqversion:1.04

Trust: 1.0

vendor:hpmodel:zbookscope:eqversion:1.04

Trust: 1.0

vendor:hpmodel:700 seriesscope:eqversion:2.09

Trust: 1.0

vendor:hpmodel:zbookscope:eqversion:1.03

Trust: 1.0

vendor:hpmodel:800 seriesscope:eqversion:2.09

Trust: 1.0

vendor:hpmodel:700 seriesscope:eqversion:1.05

Trust: 1.0

vendor:hpmodel:1000 seriesscope:eqversion:1.1

Trust: 1.0

vendor:hpmodel:700 seriesscope:eqversion:2.05

Trust: 1.0

vendor:hpmodel:700 seriesscope:eqversion:2.07

Trust: 1.0

vendor:hpmodel:700 seriesscope:eqversion:1.08

Trust: 1.0

vendor:hpmodel:z238scope:eqversion:1.11

Trust: 1.0

vendor:hpmodel:800 seriesscope:eqversion:2.1

Trust: 1.0

vendor:hpmodel:1000 seriesscope:eqversion:1.01

Trust: 1.0

vendor:hpmodel:z240scope:eqversion:1.11

Trust: 1.0

vendor:hewlett packardmodel:hp elitebook 1000 seriesscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 700 seriesscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 725 g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 745 g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 755 g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 820 g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 840 g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook 850 g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook folio 1012 x2 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitebook folio 1040 g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitedesk 705 g2 dmscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitedesk 705 g2 mt/sffscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitedesk 800 g2 dmscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitedesk 800 g2 twrscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitedesk 800 sffscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp elitedesk 800 seriesscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp eliteone 705 g2 23in aio t/ntscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp eliteone 800 g2 23-in t/ntscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp mp9 g2 retail systemscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp mt42 mobile thin clientscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp z238 microtower workstation n51scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp z238 microtower workstationscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp z240 sff workstation n51scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp z240 tower workstation n51scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp z240 workstationscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook 15 g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook 15u g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook 17 g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbook studio g3scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp zbookscope: - version: -

Trust: 0.8

vendor:hpmodel:elitebook 850 g3scope:eqversion: -

Trust: 0.6

vendor:hpmodel:elitebook 840 g3scope:eqversion: -

Trust: 0.6

vendor:hpmodel:elitedesk 800 g2 dmscope:eqversion: -

Trust: 0.6

vendor:hpmodel:elitebook folio 1040 g3scope:eqversion: -

Trust: 0.6

vendor:hpmodel:mt42 mobile thin clientscope:eqversion: -

Trust: 0.6

vendor:hpmodel:elitebook 820 g3scope:eqversion: -

Trust: 0.6

vendor:hpmodel:elitedesk 705 g2 dmscope: - version: -

Trust: 0.6

vendor:hpmodel:eliteone 705 g2 23in aio t\\\/ntscope:eqversion: -

Trust: 0.6

vendor:hpmodel:zbook studio g3scope:eqversion: -

Trust: 0.6

sources: JVNDB: JVNDB-2016-001709 // CNNVD: CNNVD-201603-033 // NVD: CVE-2016-2243

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-2243
value: HIGH

Trust: 1.0

NVD: CVE-2016-2243
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201603-033
value: MEDIUM

Trust: 0.6

VULHUB: VHN-91062
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-2243
severity: MEDIUM
baseScore: 5.4
vectorString: AV:L/AC:M/AU:N/C:N/I:P/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-91062
severity: MEDIUM
baseScore: 5.4
vectorString: AV:L/AC:M/AU:N/C:N/I:P/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-2243
baseSeverity: HIGH
baseScore: 7.9
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.5
impactScore: 5.8
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-91062 // JVNDB: JVNDB-2016-001709 // CNNVD: CNNVD-201603-033 // NVD: CVE-2016-2243

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-91062 // JVNDB: JVNDB-2016-001709 // NVD: CVE-2016-2243

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201603-033

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201603-033

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001709

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-91062

PATCH

title:HPSBHF03439url:https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05012469

Trust: 0.8

title:Multiple HP Product denial of service vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60394

Trust: 0.6

sources: JVNDB: JVNDB-2016-001709 // CNNVD: CNNVD-201603-033

EXTERNAL IDS

db:NVDid:CVE-2016-2243

Trust: 2.6

db:SECTRACKid:1035193

Trust: 1.1

db:JVNDBid:JVNDB-2016-001709

Trust: 0.8

db:CNNVDid:CNNVD-201603-033

Trust: 0.7

db:AUSCERTid:ESB-2016.0582

Trust: 0.6

db:PACKETSTORMid:136085

Trust: 0.2

db:VULHUBid:VHN-91062

Trust: 0.1

sources: VULHUB: VHN-91062 // JVNDB: JVNDB-2016-001709 // PACKETSTORM: 136085 // CNNVD: CNNVD-201603-033 // NVD: CVE-2016-2243

REFERENCES

url:https://h20565.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c05012469

Trust: 1.8

url:http://www.securitytracker.com/id/1035193

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2243

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2243

Trust: 0.8

url:https://www.auscert.org.au/render.html?it=31937

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2016-2243

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:http://www.hp.com

Trust: 0.1

url:http://support.hp.com/us/en/subscribe/

Trust: 0.1

sources: VULHUB: VHN-91062 // JVNDB: JVNDB-2016-001709 // PACKETSTORM: 136085 // CNNVD: CNNVD-201603-033 // NVD: CVE-2016-2243

CREDITS

HP

Trust: 0.1

sources: PACKETSTORM: 136085

SOURCES

db:VULHUBid:VHN-91062
db:JVNDBid:JVNDB-2016-001709
db:PACKETSTORMid:136085
db:CNNVDid:CNNVD-201603-033
db:NVDid:CVE-2016-2243

LAST UPDATE DATE

2024-11-23T22:34:50.832000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-91062date:2016-12-03T00:00:00
db:JVNDBid:JVNDB-2016-001709date:2016-03-15T00:00:00
db:CNNVDid:CNNVD-201603-033date:2016-03-07T00:00:00
db:NVDid:CVE-2016-2243date:2024-11-21T02:48:06.007

SOURCES RELEASE DATE

db:VULHUBid:VHN-91062date:2016-03-04T00:00:00
db:JVNDBid:JVNDB-2016-001709date:2016-03-15T00:00:00
db:PACKETSTORMid:136085date:2016-03-04T22:51:18
db:CNNVDid:CNNVD-201603-033date:2016-03-04T00:00:00
db:NVDid:CVE-2016-2243date:2016-03-04T15:59:00.107