Vulnerability Details : CVE-2022-37018
A potential vulnerability has been identified in the system BIOS for certain HP PC products which may allow escalation of privileges and code execution. HP is releasing firmware updates to mitigate the potential vulnerability.
Products affected by CVE-2022-37018
- cpe:2.3:o:hp:elite_slice_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elite_x2_1012_g1_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_1030_g1_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_820_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_828_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_840_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_848_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_850_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_folio_g1_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitedesk_800_g2_sff_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:eliteone_800_g2_aio_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:mp9_g2_retail_system_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_11_g2_firmware:*:*:*:*:education:*:*:*
- cpe:2.3:o:hp:probook_440_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_470_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_640_g2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_650_g2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_600_g2_dm_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_600_g2_sff_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:proone_400_g2_aio_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:proone_600_g2_aio_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:zbook_15_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:zbook_15u_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:zbook_17_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:zbook_studio_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:z1_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:z2_mini_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:z238_microtower_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:z240_sff_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:z240_tower_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elite_x2_1012_g2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_1040_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_x360_1020_g2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_x360_1030_g2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:pro_x2_612_g2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:zbook_studio_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:engage_one_aio_system_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:rp9_g1_retail_system_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitedesk_800_35w_g2_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitedesk_800_35w_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitedesk_800_65w_g2_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitedesk_800_65w_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:eliteone_800_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_400_g3_dm_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_400_g4_microtower_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_400_g4_sff_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_480_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_600_g2_microtower_pc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_600_g3_desktop_mini_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_600_g3_microtower_pc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_600_g3_sff_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_680_g2_microtower_pc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:prodesk_680_g3_microtower_pc_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:proone_400_g3_aio_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:proone_480_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:proone_600_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_1040_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_820_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_828_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_840_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_848_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:elitebook_850_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_430_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_440_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_446_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_450_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_470_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_640_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_650_g3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:probook_x360_11_g2_firmware:*:*:*:*:education:*:*:*
- cpe:2.3:o:hp:zbook_14u_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:zbook_15_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:zbook_15u_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:zbook_17_g4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:hp:zbook_studio_x2_g4_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-37018
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-37018
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.4
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.5
|
5.9
|
NIST |
References for CVE-2022-37018
-
https://support.hp.com/us-en/document/ish_7191946-7191970-16/hpsbhf03820
HP PC BIOS November 2022 Security Update for Potential Stack Buffer Overflow | HP® Customer SupportPatch;Vendor Advisory
Jump to