FKIE_CVE-2024-27458
Vulnerability from fkie_nvd - Published: 2024-10-07 17:15 - Updated: 2024-10-07 17:47
Severity ?
Summary
A potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support."
},
{
"lang": "es",
"value": "Se ha identificado una posible vulnerabilidad de seguridad en el software HP Hotkey Support, que podr\u00eda permitir la escalada local de privilegios. HP est\u00e1 lanzando una mitigaci\u00f3n para la posible vulnerabilidad. Se recomienda a los clientes que utilizan HP Programmable Key que actualicen HP Hotkey Support."
}
],
"id": "CVE-2024-27458",
"lastModified": "2024-10-07T17:47:48.410",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0,
"source": "hp-security-alert@hp.com",
"type": "Secondary"
}
]
},
"published": "2024-10-07T17:15:15.297",
"references": [
{
"source": "hp-security-alert@hp.com",
"url": "https://support.hp.com/us-en/document/ish_11342101-11342130-16/hpsbhf03977"
}
],
"sourceIdentifier": "hp-security-alert@hp.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-59"
}
],
"source": "hp-security-alert@hp.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…