CVE-2022-43779

7.0 HIGH

📋 TL;DR

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in AMI UEFI Firmware used in certain HP PC products could allow attackers to execute arbitrary code, cause denial of service, or disclose sensitive information. This affects HP PC products with vulnerable AMI UEFI Firmware versions. Attackers with local access could potentially exploit this to gain elevated privileges.

💻 Affected Systems

Products:
  • HP PC products with AMI UEFI Firmware
Versions: Specific versions not publicly detailed in advisory
Operating Systems: All operating systems running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to system; specific HP models not enumerated in public advisory

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains persistent firmware-level access, enabling arbitrary code execution, complete system compromise, and potential hardware bricking.

🟠

Likely Case

Local attacker gains elevated privileges, executes arbitrary code at firmware level, leading to system compromise and data theft.

🟢

If Mitigated

With proper access controls and patching, risk is limited to authorized users with physical access attempting privilege escalation.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local access and detailed knowledge of UEFI firmware internals

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AMI UEFI Firmware updates via HP BIOS updates

Vendor Advisory: https://support.hp.com/us-en/document/ish_7394557-7394585-16/hpsbhf03829

Restart Required: Yes

Instructions:

1. Visit HP Support website. 2. Enter your HP product number. 3. Download latest BIOS/UEFI firmware update. 4. Run update utility. 5. Restart system as prompted.

🔧 Temporary Workarounds

Restrict Physical Access

all

Limit physical access to vulnerable systems to authorized personnel only

Enable Secure Boot

all

Enable Secure Boot in UEFI settings to prevent unauthorized firmware modifications

🧯 If You Can't Patch

  • Implement strict physical security controls and access monitoring
  • Isolate vulnerable systems from sensitive networks and data

🔍 How to Verify

Check if Vulnerable:

Check HP support site with your product number to see if BIOS update is available for CVE-2022-43779

Check Version:

wmic bios get smbiosbiosversion (Windows) or dmidecode -s bios-version (Linux)

Verify Fix Applied:

Verify BIOS/UEFI firmware version matches or exceeds version listed in HP security bulletin

📡 Detection & Monitoring

Log Indicators:

  • Unexpected BIOS/UEFI firmware modification attempts
  • Failed firmware update attempts

SIEM Query:

EventID=12 OR EventID=13 (Windows System logs for firmware changes)

🔗 References

📤 Share & Export