CVE-2022-31644

7.8 HIGH

📋 TL;DR

This CVE describes BIOS vulnerabilities in certain HP PC products that could allow attackers to execute arbitrary code, escalate privileges, cause denial of service, or disclose sensitive information. The vulnerability affects HP PC users with specific BIOS versions and requires physical or administrative access to exploit. This is an incorrect authorization vulnerability (CWE-863) in the system BIOS.

💻 Affected Systems

Products:
  • HP PC products with specific BIOS versions
Versions: Multiple BIOS versions across various HP PC models
Operating Systems: All operating systems running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Specific affected models and BIOS versions are detailed in HP's security bulletin. The vulnerability is in the BIOS firmware itself, affecting all operating systems running on the hardware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical or administrative access could gain complete control of the system, bypass all security controls, install persistent malware in firmware, and access sensitive data including encryption keys.

🟠

Likely Case

Malicious insiders or attackers with physical access could escalate privileges, bypass security controls, and potentially maintain persistence through firmware-level compromise.

🟢

If Mitigated

With proper physical security controls and BIOS password protection, the attack surface is significantly reduced, though the vulnerability remains present in the firmware.

🌐 Internet-Facing: LOW - This vulnerability requires physical or administrative access to the system and cannot be exploited remotely over the internet.
🏢 Internal Only: MEDIUM - Internal attackers with physical access or administrative privileges could exploit this vulnerability to compromise systems within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access or administrative privileges. The vulnerability involves incorrect authorization checks in BIOS functions that could be manipulated by an attacker with access to BIOS/UEFI settings or firmware update mechanisms.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BIOS updates provided by HP for specific models

Vendor Advisory: https://support.hp.com/us-en/document/ish_6664419-6664458-16/hpsbhf03806

Restart Required: Yes

Instructions:

1. Identify your HP PC model and current BIOS version. 2. Visit HP Support website and search for BIOS updates for your specific model. 3. Download the latest BIOS update from HP's official site. 4. Follow HP's instructions to update the BIOS (typically involves running an executable in Windows or using a USB flash drive). 5. Restart the system as required by the update process.

🔧 Temporary Workarounds

Enable BIOS/UEFI Password

all

Set a strong BIOS/UEFI password to prevent unauthorized access to BIOS settings and firmware update functions.

Physical Security Controls

all

Implement physical security measures to prevent unauthorized physical access to systems, including locked server rooms, cable locks for laptops, and access controls.

🧯 If You Can't Patch

  • Implement strict physical security controls and limit physical access to affected systems
  • Enable BIOS/UEFI passwords and secure boot features to reduce attack surface

🔍 How to Verify

Check if Vulnerable:

Check your HP PC model and BIOS version against HP's security bulletin. In Windows, you can check BIOS version via System Information (msinfo32) or Command Prompt (wmic bios get smbiosbiosversion).

Check Version:

wmic bios get smbiosbiosversion (Windows) or dmidecode -s bios-version (Linux)

Verify Fix Applied:

After BIOS update, verify the new BIOS version matches the patched version listed in HP's security advisory. Check that the version has increased from the vulnerable version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected BIOS/UEFI configuration changes
  • Failed BIOS update attempts
  • Unauthorized physical access logs

Network Indicators:

  • BIOS updates typically do not generate network traffic unless using network-based update mechanisms

SIEM Query:

Search for events related to BIOS/UEFI configuration changes, firmware updates, or physical security breaches on affected HP systems.

🔗 References

📤 Share & Export