HPE Superdome Flex, Superdome Flex 280 and Compute Scale-up Server 3200 Servers Arbitrary Code Execution (CVE-2021-38578)

Published On: Apr 19, 2024 20:00

Advisory No: TZCERT/SA/2024/04/19

Source: Hewlett Packard Enterprise (HPE)

Software Affected: HPE Compute Scale-up Server 3200, HPE Superdome Flex 280 Server and HPE Superdome Flex Server

Overview

Description

Advisory No: TZCERT/SA/2024/04/19

Date of First Release: 19th April 2024

Source: Hewlett Packard Enterprise (HPE)

Software Affected: HPE Compute Scale-up Server 3200, HPE Superdome Flex 280 Server and HPE Superdome Flex Server

Overview:

Three HPE products are affected by the critical vulnerability. The vulnerability may allow an attacker to execute arbitrary code with root privilege on the affected system.

Description:

Compute Scale-up Server 3200, Superdome Flex 280 Server and Superdome Flex Server the products by HPE are affected by the 9.8 rating score vulnerability resulting from mishandling caused by CommBuffer checks. The CommBuffer checks currently implemented in SmmEntryPoint do not detect situations where there is an underflow in the computation of BufferSize. Exploitation of this vulnerability could allow the attacker to overwrite SMM memory leading to execution of arbitrary code with privilege elevation.

Impact:

Successful exploitation of this vulnerability may allow an unauthenticated attacker to take control of the affected system.

Solution:

HP has released security patches for this vulnerability. Users and administrators are encouraged to apply necessary updates.

References:

  1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04633en_us&docLocale=en_US
  2. https://www.cvedetails.com/cve/CVE-2021-38578

Impact

Solution

References

Subscribe To TZ - CERT Newsletter

A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.

Subscribe
Report Incident