CVE-2020-7135 (GCVE-0-2020-7135)
Vulnerability from cvelistv5
Published
2020-04-27 14:16
Modified
2024-08-04 09:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- local execution of arbitrary code with privilege elevation
Summary
A potential security vulnerability has been identified in the disk drive firmware installers named Supplemental Update / Online ROM Flash Component on HPE servers running Linux. The vulnerable software is included in the HPE Service Pack for ProLiant (SPP) releases 2018.06.0, 2018.09.0, and 2018.11.0. The vulnerable software is the Supplemental Update / Online ROM Flash Component for Linux (x64) software. The installer in this software component could be locally exploited to execute arbitrary code. Drive Models can be found in the Vulnerability Resolution field of the security bulletin. The 2019_03 SPP and Supplemental update / Online ROM Flash Component for Linux (x64) after 2019.03.0 has fixed this issue.
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| HPE | HPE Service Pack for ProLiant |
Version: 2018.06.0 Version: 2018.09.0 Version: 2018.11.0 |
|||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T09:18:03.037Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03945en_us"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "HPE Service Pack for ProLiant",
"vendor": "HPE",
"versions": [
{
"status": "affected",
"version": "2018.06.0"
},
{
"status": "affected",
"version": "2018.09.0"
},
{
"status": "affected",
"version": "2018.11.0"
}
]
},
{
"product": "HPE Server Solid State Drives",
"vendor": "HPE",
"versions": [
{
"status": "affected",
"version": "HPG2"
}
]
},
{
"product": "HPE Server SAS Hard Drives",
"vendor": "HPE",
"versions": [
{
"status": "affected",
"version": "HPG2"
}
]
},
{
"product": "HPE Server SATA Hard Drives",
"vendor": "HPE",
"versions": [
{
"status": "affected",
"version": "HPG2"
}
]
},
{
"product": "HPE SATA Read Intensive Solid State Drives",
"vendor": "HPE",
"versions": [
{
"status": "affected",
"version": "HPG2"
}
]
},
{
"product": "HPE NVMe Mixed Use Solid State Drives",
"vendor": "HPE",
"versions": [
{
"status": "affected",
"version": "HPG2"
}
]
},
{
"product": "HPE Business Critical Hard Drives",
"vendor": "HPE",
"versions": [
{
"status": "affected",
"version": "HPG2"
}
]
},
{
"product": "HPE Server Enterprise Hard Drives",
"vendor": "HPE",
"versions": [
{
"status": "affected",
"version": "HPG2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A potential security vulnerability has been identified in the disk drive firmware installers named Supplemental Update / Online ROM Flash Component on HPE servers running Linux. The vulnerable software is included in the HPE Service Pack for ProLiant (SPP) releases 2018.06.0, 2018.09.0, and 2018.11.0. The vulnerable software is the Supplemental Update / Online ROM Flash Component for Linux (x64) software. The installer in this software component could be locally exploited to execute arbitrary code. Drive Models can be found in the Vulnerability Resolution field of the security bulletin. The 2019_03 SPP and Supplemental update / Online ROM Flash Component for Linux (x64) after 2019.03.0 has fixed this issue."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "local execution of arbitrary code with privilege elevation",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-04-27T14:16:32.000Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03945en_us"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-alert@hpe.com",
"ID": "CVE-2020-7135",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "HPE Service Pack for ProLiant",
"version": {
"version_data": [
{
"version_value": "2018.06.0"
},
{
"version_value": "2018.09.0"
},
{
"version_value": "2018.11.0"
}
]
}
},
{
"product_name": "HPE Server Solid State Drives",
"version": {
"version_data": [
{
"version_value": "HPG2"
}
]
}
},
{
"product_name": "HPE Server SAS Hard Drives",
"version": {
"version_data": [
{
"version_value": "HPG2"
}
]
}
},
{
"product_name": "HPE Server SATA Hard Drives",
"version": {
"version_data": [
{
"version_value": "HPG2"
}
]
}
},
{
"product_name": "HPE SATA Read Intensive Solid State Drives",
"version": {
"version_data": [
{
"version_value": "HPG2"
}
]
}
},
{
"product_name": "HPE NVMe Mixed Use Solid State Drives",
"version": {
"version_data": [
{
"version_value": "HPG2"
}
]
}
},
{
"product_name": "HPE Business Critical Hard Drives",
"version": {
"version_data": [
{
"version_value": "HPG2"
}
]
}
},
{
"product_name": "HPE Server Enterprise Hard Drives",
"version": {
"version_data": [
{
"version_value": "HPG2"
}
]
}
}
]
},
"vendor_name": "HPE"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A potential security vulnerability has been identified in the disk drive firmware installers named Supplemental Update / Online ROM Flash Component on HPE servers running Linux. The vulnerable software is included in the HPE Service Pack for ProLiant (SPP) releases 2018.06.0, 2018.09.0, and 2018.11.0. The vulnerable software is the Supplemental Update / Online ROM Flash Component for Linux (x64) software. The installer in this software component could be locally exploited to execute arbitrary code. Drive Models can be found in the Vulnerability Resolution field of the security bulletin. The 2019_03 SPP and Supplemental update / Online ROM Flash Component for Linux (x64) after 2019.03.0 has fixed this issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "local execution of arbitrary code with privilege elevation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03945en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03945en_us"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2020-7135",
"datePublished": "2020-04-27T14:16:32.000Z",
"dateReserved": "2020-01-16T00:00:00.000Z",
"dateUpdated": "2024-08-04T09:18:03.037Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…