2024-07-14 02:06:08 +00:00

120 lines
3.6 KiB
JSON

{
"id": "CVE-2023-5409",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-10-13T17:15:09.713",
"lastModified": "2023-10-20T15:42:22.057",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HP is aware of a potential security vulnerability in HP t430 and t638 Thin Client PCs. These models may be susceptible to a physical attack, allowing an untrusted source to tamper with the system firmware using a publicly disclosed private key. HP is providing recommended guidance for customers to reduce exposure to the potential vulnerability."
},
{
"lang": "es",
"value": "HP es consciente de una posible vulnerabilidad de seguridad en las PC Thin Client HP t430 y t638. Estos modelos pueden ser susceptibles a un ataque f\u00edsico, lo que permite que una fuente no confiable altere el firmware del sistema utilizando una clave privada divulgada p\u00fablicamente. HP proporciona orientaci\u00f3n recomendada para que los clientes reduzcan la exposici\u00f3n a la vulnerabilidad potencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hp:t430_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33625E33-810C-441F-BFEC-A62CF2DC57BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:t430_thin_client_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D57D386-8265-4EF7-B88A-A57F68233E1E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hp:t638_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "088B2E46-7977-4F8B-B440-471E188A84C3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:t638_thin_client_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86E50369-0AA4-41E1-A0BA-18C5C3F7FE91"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_9441200-9441233-16",
"source": "hp-security-alert@hp.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}