CVE-2022-43779
📋 TL;DR
A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in AMI UEFI Firmware used in certain HP PC products could allow attackers to execute arbitrary code, cause denial of service, or disclose sensitive information. This affects HP PC products with vulnerable AMI UEFI Firmware versions. Attackers with local access could potentially exploit this to gain elevated privileges.
💻 Affected Systems
- HP PC products with AMI UEFI Firmware
📦 What is this software?
Desktop Pro A G2 Microtower Firmware by Hp
View all CVEs affecting Desktop Pro A G2 Microtower Firmware →
Desktop Pro A G3 Microtower Firmware by Hp
View all CVEs affecting Desktop Pro A G3 Microtower Firmware →
Desktop Pro G3 Microtower Firmware by Hp
View all CVEs affecting Desktop Pro G3 Microtower Firmware →
Zhan 66 Pro A G1 Microtower Firmware by Hp
View all CVEs affecting Zhan 66 Pro A G1 Microtower Firmware →
Zhan 66 Pro A G1 R Microtower Firmware by Hp
View all CVEs affecting Zhan 66 Pro A G1 R Microtower Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains persistent firmware-level access, enabling arbitrary code execution, complete system compromise, and potential hardware bricking.
Likely Case
Local attacker gains elevated privileges, executes arbitrary code at firmware level, leading to system compromise and data theft.
If Mitigated
With proper access controls and patching, risk is limited to authorized users with physical access attempting privilege escalation.
🎯 Exploit Status
Exploitation requires local access and detailed knowledge of UEFI firmware internals
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: AMI UEFI Firmware updates via HP BIOS updates
Vendor Advisory: https://support.hp.com/us-en/document/ish_7394557-7394585-16/hpsbhf03829
Restart Required: Yes
Instructions:
1. Visit HP Support website. 2. Enter your HP product number. 3. Download latest BIOS/UEFI firmware update. 4. Run update utility. 5. Restart system as prompted.
🔧 Temporary Workarounds
Restrict Physical Access
allLimit physical access to vulnerable systems to authorized personnel only
Enable Secure Boot
allEnable Secure Boot in UEFI settings to prevent unauthorized firmware modifications
🧯 If You Can't Patch
- Implement strict physical security controls and access monitoring
- Isolate vulnerable systems from sensitive networks and data
🔍 How to Verify
Check if Vulnerable:
Check HP support site with your product number to see if BIOS update is available for CVE-2022-43779
Check Version:
wmic bios get smbiosbiosversion (Windows) or dmidecode -s bios-version (Linux)
Verify Fix Applied:
Verify BIOS/UEFI firmware version matches or exceeds version listed in HP security bulletin
📡 Detection & Monitoring
Log Indicators:
- Unexpected BIOS/UEFI firmware modification attempts
- Failed firmware update attempts
SIEM Query:
EventID=12 OR EventID=13 (Windows System logs for firmware changes)