NVD Vulnerability Detail
Search Exploit, PoC
CVE-2020-7205
Summary

A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the "Boot Hole" issue for HPE signed GRUB2 applications.

Publication Date July 31, 2020, 3:15 a.m.
Registration Date Jan. 26, 2021, 12:01 p.m.
Last Update Nov. 21, 2024, 2:36 p.m.
CVSS3.1 : MEDIUM
スコア 6.7
Vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
攻撃元区分(AV) ローカル
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
CVSS2.0 : HIGH
Score 7.2
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C
攻撃元区分(AV) ローカル
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:* 1.72
execution environment
1 cpe:2.3:h:hpe:proliant_bl460c_gen8_blade_server:-:*:*:*:*:*:*:*
2 cpe:2.3:h:hpe:proliant_bl660c_gen8_blade_server:-:*:*:*:*:*:*:*
3 cpe:2.3:h:hpe:proliant_dl160_gen8_server:-:*:*:*:*:*:*:*
4 cpe:2.3:h:hpe:proliant_dl360e_gen8_server:-:*:*:*:*:*:*:*
5 cpe:2.3:h:hpe:proliant_dl360p_gen8_server:-:*:*:*:*:*:*:*
6 cpe:2.3:h:hpe:proliant_dl380e_gen8_server:-:*:*:*:*:*:*:*
7 cpe:2.3:h:hpe:proliant_dl380p_gen8_server:-:*:*:*:*:*:*:*
8 cpe:2.3:h:hpe:proliant_dl385p_gen8_server:-:*:*:*:*:*:*:*
9 cpe:2.3:h:hpe:proliant_dl560_gen8_server:-:*:*:*:*:*:*:*
10 cpe:2.3:h:hpe:proliant_dl580_gen8_server:-:*:*:*:*:*:*:*
11 cpe:2.3:h:hpe:proliant_ml310e_gen8_server:-:*:*:*:*:*:*:*
12 cpe:2.3:h:hpe:proliant_ml350e_gen8_server:-:*:*:*:*:*:*:*
13 cpe:2.3:h:hpe:proliant_ml350p_gen8_server:-:*:*:*:*:*:*:*
14 cpe:2.3:h:hpe:proliant_sl230s_gen8_server:-:*:*:*:*:*:*:*
15 cpe:2.3:h:hpe:proliant_sl250s_gen8_server:-:*:*:*:*:*:*:*
16 cpe:2.3:h:hpe:proliant_sl270s_gen8_server:-:*:*:*:*:*:*:*
17 cpe:2.3:h:hpe:proliant_sl4540_gen8_server:-:*:*:*:*:*:*:*
18 cpe:2.3:h:hpe:proliant_ws460c_gen8_graphics_server_blade:-:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:* 2.81
cpe:2.3:a:hpe:service_pack_for_proliant:*:*:*:*:*:*:*:* 2020.03.0
cpe:2.3:a:hpe:smartstart_scripting_toolkit:*:*:*:*:*:linux:*:* 11.40
execution environment
1 cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*
2 cpe:2.3:h:hpe:apollo_4520_chassis:-:*:*:*:*:*:*:*
3 cpe:2.3:h:hpe:cloudline_cl3100_gen9_server:-:*:*:*:*:*:*:*
4 cpe:2.3:h:hpe:cloudline_cl5200_gen9_server:-:*:*:*:*:*:*:*
5 cpe:2.3:h:hpe:cloudline_cl5800_gen9_server:-:*:*:*:*:*:*:*
6 cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*
7 cpe:2.3:h:hpe:proliant_bl660c_gen9_server_blade:-:*:*:*:*:*:*:*
8 cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*
9 cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*
10 cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*
11 cpe:2.3:h:hpe:proliant_dl20_gen9_server:-:*:*:*:*:*:*:*
12 cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*
13 cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*
14 cpe:2.3:h:hpe:proliant_dl388_gen9_server:-:*:*:*:*:*:*:*
15 cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*
16 cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*
17 cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*
18 cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*
19 cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*
20 cpe:2.3:h:hpe:proliant_m510_server_cartridge:-:*:*:*:*:*:*:*
21 cpe:2.3:h:hpe:proliant_m710x-l_server_blade:-:*:*:*:*:*:*:*
22 cpe:2.3:h:hpe:proliant_m710x_server_blade:-:*:*:*:*:*:*:*
23 cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*
24 cpe:2.3:h:hpe:proliant_ml10_gen9_server:-:*:*:*:*:*:*:*
25 cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*
26 cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*
27 cpe:2.3:h:hpe:proliant_ml30_gen9_server:-:*:*:*:*:*:*:*
28 cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*
29 cpe:2.3:h:hpe:proliant_se2160w_gen9_server:-:*:*:*:*:*:*:*
30 cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*
31 cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*
32 cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*
33 cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*
34 cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*
35 cpe:2.3:h:hpe:proliant_xl260a_gen9_server:-:*:*:*:*:*:*:*
36 cpe:2.3:h:hpe:proliant_xl270d_gen9_server:-:*:*:*:*:*:*:*
37 cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*
38 cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*
39 cpe:2.3:h:hpe:proliant_xl740f_gen9_server:-:*:*:*:*:*:*:*
40 cpe:2.3:h:hpe:proliant_xl750f_gen9_server:-:*:*:*:*:*:*:*
41 cpe:2.3:h:hpe:storeeasy_1000_storage_gen9:-:*:*:*:*:*:*:*
42 cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*
43 cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*
44 cpe:2.3:h:hpe:synergy_660_gen9_compute_module:-:*:*:*:*:*:*:*
45 cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*
46 cpe:2.3:h:hpe:synergy_d3940_storage_module:-:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:* 3.30.213
cpe:2.3:a:hpe:intelligent_provisioning:3.31:*:*:*:*:*:*:*
cpe:2.3:a:hpe:intelligent_provisioning:3.40:*:*:*:*:*:*:*
cpe:2.3:a:hpe:service_pack_for_proliant:*:*:*:*:*:*:*:* 2020.03.0
cpe:2.3:a:hpe:smartstart_scripting_toolkit:*:*:*:*:*:linux:*:* 11.40
execution environment
1 cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*
2 cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*
3 cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*
4 cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*
5 cpe:2.3:h:hpe:cloudline_cl2100_gen10_server:-:*:*:*:*:*:*:*
6 cpe:2.3:h:hpe:cloudline_cl2200_gen10_server:-:*:*:*:*:*:*:*
7 cpe:2.3:h:hpe:cloudline_cl2600_gen10_server:-:*:*:*:*:*:*:*
8 cpe:2.3:h:hpe:cloudline_cl2800_gen10_server:-:*:*:*:*:*:*:*
9 cpe:2.3:h:hpe:cloudline_cl3100_gen10_server:-:*:*:*:*:*:*:*
10 cpe:2.3:h:hpe:cloudline_cl3150_gen10_server:-:*:*:*:*:*:*:*
11 cpe:2.3:h:hpe:cloudline_cl4100_gen10_server:-:*:*:*:*:*:*:*
12 cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*
13 cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*
14 cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*
15 cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*
16 cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*
17 cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*
18 cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*
19 cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*
20 cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*
21 cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*
22 cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*
23 cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*
24 cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*
25 cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*
26 cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*
27 cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*
28 cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*
29 cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*
30 cpe:2.3:h:hpe:proliant_microserver_gen10:-:*:*:*:*:*:*:*
31 cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*
32 cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*
33 cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*
34 cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*
35 cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*
36 cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*
37 cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*
38 cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*
39 cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*
40 cpe:2.3:h:hpe:proliant_xl270d_gen9_special_server:-:*:*:*:*:*:*:*
41 cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*
42 cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*
43 cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*
44 cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*
45 cpe:2.3:h:hpe:simplivity_2600_gen10:-:*:*:*:*:*:*:*
46 cpe:2.3:h:hpe:simplivity_325_gen10:-:*:*:*:*:*:*:*
47 cpe:2.3:h:hpe:simplivity_380_gen10:-:*:*:*:*:*:*:*
48 cpe:2.3:h:hpe:storeeasy_1000_storage_gen10:-:*:*:*:*:*:*:*
49 cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*
50 cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*
51 cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
複数の HPE 製品におけるコードインジェクションの脆弱性
Title 複数の HPE 製品におけるコードインジェクションの脆弱性
Summary

HPE Intelligent Provisioning、Service Pack for ProLiant、Scripting ToolKit には、コードインジェクションの脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date July 29, 2020, midnight
Registration Date Oct. 19, 2020, 11:46 a.m.
Last Update Jan. 13, 2021, 5:34 p.m.
Affected System
日立
日立アドバンストサーバ HA8000Vシリーズ
ヒューレット・パッカード・エンタープライズ
HPE Intelligent Provisioning 
HPE Scripting ToolKit 
HPE Service Pack for ProLiant 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2020年10月19日]
  掲載
Oct. 19, 2020, 11:46 a.m.
2 [2021年01月13日]
  影響を受けるシステム:内容を更新
  ベンダ情報:サーバ・クライアント製品セキュリティ情報 (hitachi-sec-2021-201) を追加
Jan. 13, 2021, 3:09 p.m.