CVE-2024-4143

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical vulnerability in AMI BIOS firmware used by certain HP PC products that could allow attackers to execute arbitrary code. The vulnerability affects HP devices with specific AMI BIOS versions and requires physical or local administrative access to exploit. This is a high-severity vulnerability with a CVSS score of 9.8.

💻 Affected Systems

Products:
  • HP PC products with AMI BIOS
Versions: Specific AMI BIOS versions as listed in HP advisory
Operating Systems: All operating systems running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires specific HP PC models with vulnerable AMI BIOS firmware. Check HP advisory for exact model list.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent malware, steal sensitive data, or create backdoors that survive OS reinstallation.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls and gain administrative access to the system.

🟢

If Mitigated

Limited impact if proper access controls prevent unauthorized physical or local administrative access to vulnerable systems.

🌐 Internet-Facing: LOW - This vulnerability requires local or physical access to exploit, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Internal attackers with physical or local administrative access could exploit this vulnerability to compromise systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access or local administrative privileges. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated AMI BIOS firmware versions provided by HP

Vendor Advisory: https://support.hp.com/us-en/document/ish_10914391-10914417-16/hpsbhf03953

Restart Required: Yes

Instructions:

1. Identify affected HP PC models from HP advisory. 2. Download appropriate BIOS update from HP Support. 3. Run BIOS update utility. 4. Restart system to apply firmware update.

🔧 Temporary Workarounds

Restrict physical access

all

Limit physical access to vulnerable systems to authorized personnel only

Enforce least privilege

all

Restrict local administrative access to essential personnel only

🧯 If You Can't Patch

  • Isolate vulnerable systems on separate network segments
  • Implement strict physical security controls and access monitoring

🔍 How to Verify

Check if Vulnerable:

Check BIOS version in system information (F2 or DEL during boot) and compare with HP advisory list

Check Version:

wmic bios get smbiosbiosversion (Windows) or dmidecode -s bios-version (Linux)

Verify Fix Applied:

Verify BIOS version after update matches patched version in HP advisory

📡 Detection & Monitoring

Log Indicators:

  • BIOS/UEFI firmware modification events
  • Unauthorized physical access attempts

Network Indicators:

  • Unusual outbound connections from BIOS/UEFI management interfaces

SIEM Query:

EventID=12 OR EventID=13 (Windows System events for firmware changes)

🔗 References

📤 Share & Export