CVE-2022-31636

7.8 HIGH

📋 TL;DR

This CVE describes a time-of-check to time-of-use (TOCTOU) vulnerability in the BIOS of certain HP PC products. It could allow attackers to execute arbitrary code, escalate privileges, cause denial of service, or disclose information. Affected users are those with specific HP PC models running vulnerable BIOS versions.

💻 Affected Systems

Products:
  • HP PC products (specific models listed in HP advisory)
Versions: Multiple BIOS versions for affected HP PC models
Operating Systems: All operating systems running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system. Affected models include various HP Elite, Pro, and Z-series workstations and desktops.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with persistent BIOS-level malware, allowing attackers to bypass operating system security controls and maintain persistence across reboots.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative access to the system and potentially install additional malware.

🟢

If Mitigated

Limited impact if proper BIOS write protection and secure boot are enabled, though some information disclosure may still occur.

🌐 Internet-Facing: LOW - This requires local access or physical presence to exploit.
🏢 Internal Only: MEDIUM - Insider threats or compromised internal accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local access and knowledge of BIOS internals. TOCTOU vulnerabilities are timing-sensitive and complex to exploit reliably.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BIOS updates provided by HP (version varies by model)

Vendor Advisory: https://support.hp.com/us-en/document/ish_7149996-7150021-16/hpsbhf03814

Restart Required: Yes

Instructions:

1. Visit HP Support website. 2. Enter your HP PC model. 3. Download latest BIOS update. 4. Run BIOS update utility. 5. Restart system when prompted.

🔧 Temporary Workarounds

Enable BIOS write protection

all

Configure BIOS settings to prevent unauthorized BIOS modifications

Enable Secure Boot

all

Enable UEFI Secure Boot to prevent unauthorized code execution during boot process

🧯 If You Can't Patch

  • Restrict physical access to affected systems
  • Implement strict access controls and monitor for suspicious BIOS modification attempts

🔍 How to Verify

Check if Vulnerable:

Check BIOS version against HP advisory for your specific PC model

Check Version:

Windows: wmic bios get smbiosbiosversion | Linux: sudo dmidecode -s bios-version

Verify Fix Applied:

Verify BIOS version has been updated to patched version listed in HP advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected BIOS update attempts
  • BIOS modification events in system logs
  • Failed BIOS flash attempts

Network Indicators:

  • Unusual BIOS update traffic from internal systems

SIEM Query:

EventID=12 OR EventID=13 (BIOS modification events in Windows Event Log)

🔗 References

📤 Share & Export