ID

VAR-201810-0064


CVE

CVE-2017-2751


TITLE

Vulnerabilities related to certificate and password management in the firmware of some notebook products

Trust: 0.8

sources: JVNDB: JVNDB-2018-013135

DESCRIPTION

A BIOS password extraction vulnerability has been reported on certain consumer notebooks with firmware F.22 and others. The BIOS password was stored in CMOS in a way that allowed it to be extracted. This applies to consumer notebooks launched in early 2014. HP 240 G1 Notebook PC, etc. are all notebook computer products of Hewlett-Packard (HP) in the United States. Attackers can exploit this vulnerability to extract BIOS passwords. The following products are affected: HP 240 G1 Notebook PC; 245 G1 Notebook PC; 1000-1300~1000-1399 Notebook PC; Compaq CQ45-900~CQ45-999 Notebook PC; 250 G1 Notebook PC; 255 G1 Notebook PC; ENVY (TouchSmart ) 15-j000~j099 Notebook PC; ENVY (TouchSmart) 15-j100~j199 Notebook PC; Pavilion (TouchSmart) 15-n000~199 Notebook PC; 246 Notebook PC; 455 Notebook PC; ENVY (TouchSmart) 17-j100~j199 Notebook PC; ENVY (TouchSmart) 17-j100 ~ j199 Leap Motion SE Notebook PC; Split 13-g200~299 x2 PC; ENVY (TouchSmart) 100~15-j199 Notebook PC; Pavilion (TouchSmart) 14-n000~199 Notebook PC ; ENVY (TouchSmart) 14-k100~14-k199 Sleekbook; ENVY TouchSmart 14-k100~14-k199 Ultrabook; Specter x2 13-SMB Pro; Specter 13-h200~299 x2 PC; Pavilion 15-n200~299 (TouchSmart) Notebook PC; Pavilion 15-n300~399

Trust: 1.8

sources: NVD: CVE-2017-2751 // JVNDB: JVNDB-2018-013135 // VULHUB: VHN-110954 // VULMON: CVE-2017-2751

AFFECTED PRODUCTS

vendor:hpmodel:compaq 14-h000scope:eqversion: -

Trust: 1.6

vendor:hpmodel:compaq cq45-900scope:eqversion: -

Trust: 1.6

vendor:hpmodel:compaq 14-s000scope:eqversion: -

Trust: 1.6

vendor:hpmodel:g14-a000scope:ltversion:f.06

Trust: 1.0

vendor:hpmodel:pavilion 15-n000scope:ltversion:f.72

Trust: 1.0

vendor:hpmodel:envy 100scope:ltversion:f.22

Trust: 1.0

vendor:hpmodel:246 g3scope:ltversion:f.43

Trust: 1.0

vendor:hpmodel:245 g1scope:ltversion:f.48

Trust: 1.0

vendor:hpmodel:15-r500scope:ltversion:f.43

Trust: 1.0

vendor:hpmodel:246scope:ltversion:f.04

Trust: 1.0

vendor:hpmodel:envy 17-j100 leap motion sescope:ltversion:f.71

Trust: 1.0

vendor:hpmodel:envy m6-n000scope:ltversion:f.26

Trust: 1.0

vendor:hpmodel:pavilion 10-f000scope:ltversion:f.0e

Trust: 1.0

vendor:hpmodel:pavilion 14-n000scope:ltversion:f.72

Trust: 1.0

vendor:hpmodel:pavilion 11-n000scope:ltversion:f.2e

Trust: 1.0

vendor:hpmodel:250 g1 notebook pcscope:ltversion:f.47

Trust: 1.0

vendor:hpmodel:pavilion 15-n200scope:ltversion:f.72

Trust: 1.0

vendor:hpmodel:envy 15-j100scope:ltversion:f.71

Trust: 1.0

vendor:hpmodel:15-r000scope:ltversion:f.43

Trust: 1.0

vendor:hpmodel:255 g3scope:ltversion:f.45

Trust: 1.0

vendor:hpmodel:240 g3scope:ltversion:f.43

Trust: 1.0

vendor:hpmodel:envy 15-j000scope:ltversion:f.22

Trust: 1.0

vendor:hpmodel:spectre x2 13-smb proscope:ltversion:f.25

Trust: 1.0

vendor:hpmodel:spectre 13-h200scope:ltversion:f.25

Trust: 1.0

vendor:hpmodel:1000-1300scope:ltversion:f.48

Trust: 1.0

vendor:hpmodel:envy 14-k100scope:ltversion:f.22

Trust: 1.0

vendor:hpmodel:255 g1 notebook pcscope:ltversion:f.47

Trust: 1.0

vendor:hpmodel:pavilion 15-n300scope:ltversion:f.72

Trust: 1.0

vendor:hpmodel:240 g1scope:ltversion:f.48

Trust: 1.0

vendor:hpmodel:14-g000scope:ltversion:f.45

Trust: 1.0

vendor:hpmodel:14-r000scope:ltversion:f.43

Trust: 1.0

vendor:hpmodel:455scope:ltversion:f.08

Trust: 1.0

vendor:hpmodel:split 13-g200scope:ltversion:f.25

Trust: 1.0

vendor:hpmodel:envy 17 j100scope:ltversion:f.71

Trust: 1.0

vendor:hewlett packardmodel:hp 1000-1300scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp 240 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp 245 g1scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp 246scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp 250 g1 notebook pcscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp 255 g1 notebook pcscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp 455scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp envy 15-j000scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp envy 15-j100scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp pavilion 15-n000scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-013135 // CNNVD: CNNVD-201810-122 // NVD: CVE-2017-2751

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2751
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-2751
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201810-122
value: MEDIUM

Trust: 0.6

VULHUB: VHN-110954
value: LOW

Trust: 0.1

VULMON: CVE-2017-2751
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-2751
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-110954
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2751
baseSeverity: MEDIUM
baseScore: 4.6
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 0.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-110954 // VULMON: CVE-2017-2751 // JVNDB: JVNDB-2018-013135 // CNNVD: CNNVD-201810-122 // NVD: CVE-2017-2751

PROBLEMTYPE DATA

problemtype:CWE-522

Trust: 1.1

problemtype:CWE-255

Trust: 0.8

sources: VULHUB: VHN-110954 // JVNDB: JVNDB-2018-013135 // NVD: CVE-2017-2751

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201810-122

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201810-122

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013135

PATCH

title:c05913581url:https://support.hp.com/us-en/document/c05913581

Trust: 0.8

title:Multiple HP Repair measures for notebook security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86095

Trust: 0.6

title:HP: HPSBGN03575 rev. 1 - BIOS Password Extraction Vulnerability on Certain HP Notebooksurl:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=HPSBGN03575

Trust: 0.1

title:HP: SUPPORT COMMUNICATION- SECURITY BULLETIN HPSBGN03575 rev. 1 - BIOS Password Extraction Vulnerability on Certain HP Notebooksurl:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=d33898d882b7769c704f65297e3a739e

Trust: 0.1

title: - url:https://github.com/khulnasoft-labs/awesome-security

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/nomi-sec/PoC-in-GitHub

Trust: 0.1

sources: VULMON: CVE-2017-2751 // JVNDB: JVNDB-2018-013135 // CNNVD: CNNVD-201810-122

EXTERNAL IDS

db:NVDid:CVE-2017-2751

Trust: 2.6

db:JVNDBid:JVNDB-2018-013135

Trust: 0.8

db:CNNVDid:CNNVD-201810-122

Trust: 0.7

db:VULHUBid:VHN-110954

Trust: 0.1

db:VULMONid:CVE-2017-2751

Trust: 0.1

sources: VULHUB: VHN-110954 // VULMON: CVE-2017-2751 // JVNDB: JVNDB-2018-013135 // CNNVD: CNNVD-201810-122 // NVD: CVE-2017-2751

REFERENCES

url:https://support.hp.com/us-en/document/c05913581

Trust: 1.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2751

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2751

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/522.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/nomi-sec/poc-in-github

Trust: 0.1

sources: VULHUB: VHN-110954 // VULMON: CVE-2017-2751 // JVNDB: JVNDB-2018-013135 // CNNVD: CNNVD-201810-122 // NVD: CVE-2017-2751

SOURCES

db:VULHUBid:VHN-110954
db:VULMONid:CVE-2017-2751
db:JVNDBid:JVNDB-2018-013135
db:CNNVDid:CNNVD-201810-122
db:NVDid:CVE-2017-2751

LAST UPDATE DATE

2024-11-23T23:04:57.756000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-110954date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-2751date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2018-013135date:2019-02-15T00:00:00
db:CNNVDid:CNNVD-201810-122date:2019-10-23T00:00:00
db:NVDid:CVE-2017-2751date:2024-11-21T03:24:07.027

SOURCES RELEASE DATE

db:VULHUBid:VHN-110954date:2018-10-03T00:00:00
db:VULMONid:CVE-2017-2751date:2018-10-03T00:00:00
db:JVNDBid:JVNDB-2018-013135date:2019-02-15T00:00:00
db:CNNVDid:CNNVD-201810-122date:2018-10-08T00:00:00
db:NVDid:CVE-2017-2751date:2018-10-03T20:29:07.067