CVE-2023-26299

7.0 HIGH

📋 TL;DR

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in AMI UEFI Firmware on certain HP PC products could allow attackers to execute arbitrary code during system boot. This affects HP PC products with vulnerable AMI UEFI Firmware versions. Exploitation requires physical or administrative access to the system.

💻 Affected Systems

Products:
  • HP PC products with AMI UEFI Firmware
Versions: Specific versions not publicly detailed in advisory
Operating Systems: All operating systems on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Check HP advisory HPSBHF03850 for specific affected product models and firmware versions

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with persistent firmware-level malware that survives OS reinstallation and disk replacement

🟠

Likely Case

Local privilege escalation allowing attackers to bypass OS security controls and install persistent backdoors

🟢

If Mitigated

Limited impact due to physical access requirements and BIOS/UEFI password protection

🌐 Internet-Facing: LOW - Requires physical or administrative access to system, not remotely exploitable
🏢 Internal Only: MEDIUM - Insider threats or compromised admin accounts could exploit this vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires physical access or administrative privileges to modify UEFI settings

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AMI UEFI Firmware updates provided by HP

Vendor Advisory: https://support.hp.com/us-en/document/ish_8642715-8642746-16/hpsbhf03850

Restart Required: Yes

Instructions:

1. Identify affected HP PC model. 2. Visit HP Support site. 3. Download latest BIOS/UEFI firmware update. 4. Run update utility. 5. Restart system as prompted.

🔧 Temporary Workarounds

Enable BIOS/UEFI Password

all

Set administrative password for BIOS/UEFI settings to prevent unauthorized modifications

Enable Secure Boot

all

Enable Secure Boot in UEFI settings to verify bootloader integrity

🧯 If You Can't Patch

  • Restrict physical access to vulnerable systems
  • Implement strict administrative access controls and monitoring

🔍 How to Verify

Check if Vulnerable:

Check HP advisory HPSBHF03850 for affected models and compare with your system's BIOS/UEFI version

Check Version:

Windows: wmic bios get smbiosbiosversion | Linux: sudo dmidecode -s bios-version

Verify Fix Applied:

Verify BIOS/UEFI firmware version matches or exceeds patched version listed in HP advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected BIOS/UEFI firmware modification events
  • Failed firmware update attempts

Network Indicators:

  • No network indicators - local exploitation only

SIEM Query:

EventID=12 OR EventID=13 (System events for firmware changes) OR unauthorized BIOS access attempts

🔗 References

📤 Share & Export