CVE-2023-26299
📋 TL;DR
A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in AMI UEFI Firmware on certain HP PC products could allow attackers to execute arbitrary code during system boot. This affects HP PC products with vulnerable AMI UEFI Firmware versions. Exploitation requires physical or administrative access to the system.
💻 Affected Systems
- HP PC products with AMI UEFI Firmware
📦 What is this software?
280 Pro G5 Small Form Factor Firmware by Hp
View all CVEs affecting 280 Pro G5 Small Form Factor Firmware →
Desktop Pro G1 Microtower Firmware by Hp
View all CVEs affecting Desktop Pro G1 Microtower Firmware →
Pro Small Form Factor 280 G9 Desktop Firmware by Hp
View all CVEs affecting Pro Small Form Factor 280 G9 Desktop Firmware →
Pro Small Form Factor 290 G9 Desktop Firmware by Hp
View all CVEs affecting Pro Small Form Factor 290 G9 Desktop Firmware →
Pro Small Form Factor Zhan 66 G9 Desktop Firmware by Hp
View all CVEs affecting Pro Small Form Factor Zhan 66 G9 Desktop Firmware →
Pro Tower Zhan 99 G9 Desktop Firmware by Hp
View all CVEs affecting Pro Tower Zhan 99 G9 Desktop Firmware →
Z Vr Backpack G1 Workstation Firmware by Hp
View all CVEs affecting Z Vr Backpack G1 Workstation Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with persistent firmware-level malware that survives OS reinstallation and disk replacement
Likely Case
Local privilege escalation allowing attackers to bypass OS security controls and install persistent backdoors
If Mitigated
Limited impact due to physical access requirements and BIOS/UEFI password protection
🎯 Exploit Status
Exploitation requires physical access or administrative privileges to modify UEFI settings
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: AMI UEFI Firmware updates provided by HP
Vendor Advisory: https://support.hp.com/us-en/document/ish_8642715-8642746-16/hpsbhf03850
Restart Required: Yes
Instructions:
1. Identify affected HP PC model. 2. Visit HP Support site. 3. Download latest BIOS/UEFI firmware update. 4. Run update utility. 5. Restart system as prompted.
🔧 Temporary Workarounds
Enable BIOS/UEFI Password
allSet administrative password for BIOS/UEFI settings to prevent unauthorized modifications
Enable Secure Boot
allEnable Secure Boot in UEFI settings to verify bootloader integrity
🧯 If You Can't Patch
- Restrict physical access to vulnerable systems
- Implement strict administrative access controls and monitoring
🔍 How to Verify
Check if Vulnerable:
Check HP advisory HPSBHF03850 for affected models and compare with your system's BIOS/UEFI version
Check Version:
Windows: wmic bios get smbiosbiosversion | Linux: sudo dmidecode -s bios-version
Verify Fix Applied:
Verify BIOS/UEFI firmware version matches or exceeds patched version listed in HP advisory
📡 Detection & Monitoring
Log Indicators:
- Unexpected BIOS/UEFI firmware modification events
- Failed firmware update attempts
Network Indicators:
- No network indicators - local exploitation only
SIEM Query:
EventID=12 OR EventID=13 (System events for firmware changes) OR unauthorized BIOS access attempts