CVE-2024-27458 (GCVE-0-2024-27458)
Vulnerability from cvelistv5 – Published: 2024-10-07 16:51 – Updated: 2024-10-07 18:48
VLAI?
Title
HP Hotkey Support – Escalation of Privilege
Summary
A potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support.
Severity ?
8.8 (High)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP, Inc. | HP Hotkey Support |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_13.5_inch_mobile_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_16_inch_g9_mobile_workstation_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_16_g9_mobile_workstation_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_inch_g8_mobile_workstation_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g8_notebook_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g7_education_edition_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_635_aero_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_860_16_inch_g9_notebook_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_14_inch_g9_notebook_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_13_inch_g9_notebook_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g8_firmware:01.09.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_max_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "elite_dragonfly_max_firmware",
"vendor": "hp",
"versions": [
{
"lessThan": "8.10.42.190_rev1",
"status": "affected",
"version": "8.10.42.190",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-27458",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-07T18:17:19.466702Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-07T18:48:44.056Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP Hotkey Support",
"vendor": "HP, Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support.\u003c/span\u003e"
}
],
"value": "A potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-07T17:20:14.563Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11342101-11342130-16/hpsbhf03977"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP Hotkey Support \u2013 Escalation of Privilege",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2024-27458",
"datePublished": "2024-10-07T16:51:17.861Z",
"dateReserved": "2024-04-16T19:22:58.750Z",
"dateUpdated": "2024-10-07T18:48:44.056Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"A potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support.\"}, {\"lang\": \"es\", \"value\": \"Se ha identificado una posible vulnerabilidad de seguridad en el software HP Hotkey Support, que podr\\u00eda permitir la escalada local de privilegios. HP est\\u00e1 lanzando una mitigaci\\u00f3n para la posible vulnerabilidad. Se recomienda a los clientes que utilizan HP Programmable Key que actualicen HP Hotkey Support.\"}]",
"id": "CVE-2024-27458",
"lastModified": "2024-10-07T17:47:48.410",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"hp-security-alert@hp.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.0, \"impactScore\": 6.0}]}",
"published": "2024-10-07T17:15:15.297",
"references": "[{\"url\": \"https://support.hp.com/us-en/document/ish_11342101-11342130-16/hpsbhf03977\", \"source\": \"hp-security-alert@hp.com\"}]",
"sourceIdentifier": "hp-security-alert@hp.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"hp-security-alert@hp.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-59\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-27458\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2024-10-07T17:15:15.297\",\"lastModified\":\"2024-10-07T17:47:48.410\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una posible vulnerabilidad de seguridad en el software HP Hotkey Support, que podr\u00eda permitir la escalada local de privilegios. HP est\u00e1 lanzando una mitigaci\u00f3n para la posible vulnerabilidad. Se recomienda a los clientes que utilizan HP Programmable Key que actualicen HP Hotkey Support.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"hp-security-alert@hp.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"hp-security-alert@hp.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"references\":[{\"url\":\"https://support.hp.com/us-en/document/ish_11342101-11342130-16/hpsbhf03977\",\"source\":\"hp-security-alert@hp.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-27458\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-07T18:17:19.466702Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:engage_go_13.5_inch_mobile_system_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:zbook_studio_16_inch_g9_mobile_workstation_pc_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:zbook_fury_16_g9_mobile_workstation_pc_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:zbook_firefly_14_inch_g8_mobile_workstation_pc_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:zbook_14u_g6_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:zbook_15u_g6_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:probook_x360_435_g7_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:probook_x360_435_g8_notebook_pc_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:probook_x360_11_g7_education_edition_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:probook_650_g5_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:probook_650_g7_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:probook_640_g5_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:probook_640_g7_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:probook_635_aero_g7_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:probook_430_g3_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_860_16_inch_g9_notebook_pc_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_855_g7_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_855_g8_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_845_14_inch_g9_notebook_pc_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_845_g7_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_845_g8_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_835_13_inch_g9_notebook_pc_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_830_g7_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_830_g8_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_835_g7_firmware:01.10.00:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_835_g8_firmware:01.09.10:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_840_g6_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_840_g7_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_840_g8_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_850_g6_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_850_g7_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elite_dragonfly_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elite_dragonfly_g2_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:hp:elite_dragonfly_max_firmware:-:*:*:*:*:*:*:*\"], \"vendor\": \"hp\", \"product\": \"elite_dragonfly_max_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.10.42.190\", \"lessThan\": \"8.10.42.190_rev1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-07T18:48:22.677Z\"}}], \"cna\": {\"title\": \"HP Hotkey Support \\u2013 Escalation of Privilege\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"HP, Inc.\", \"product\": \"HP Hotkey Support\", \"versions\": [{\"status\": \"affected\", \"version\": \"See HP Security Bulletin reference for affected versions.\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://support.hp.com/us-en/document/ish_11342101-11342130-16/hpsbhf03977\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eA potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support.\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-59\", \"description\": \"CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"shortName\": \"hp\", \"dateUpdated\": \"2024-10-07T17:20:14.563Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-27458\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-07T18:48:44.056Z\", \"dateReserved\": \"2024-04-16T19:22:58.750Z\", \"assignerOrgId\": \"74586083-13ce-40fd-b46a-8e5d23cfbcb2\", \"datePublished\": \"2024-10-07T16:51:17.861Z\", \"assignerShortName\": \"hp\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…