Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-6322 : Vulnerability Insights and Analysis

Learn about CVE-2019-6322, a security flaw in HP Workstation BIOS that allows unauthorized changes to BIOS code when TPM is disabled. Find out affected systems, impacts, and mitigation steps.

HP has discovered a security vulnerability in certain versions of Workstation BIOS (UEFI Firmware) that could be exploited to alter the runtime BIOS code when the TPM is deactivated. This vulnerability affects Workstations with the TPM enabled as the default setting.

Understanding CVE-2019-6322

This CVE involves a security flaw in Workstation BIOS that could lead to unauthorized changes in the BIOS code under specific conditions.

What is CVE-2019-6322?

CVE-2019-6322 is a vulnerability identified in certain versions of HP Workstation BIOS that allows for potential runtime BIOS code manipulation when the Trusted Platform Module (TPM) is turned off.

The Impact of CVE-2019-6322

The vulnerability could result in an escalation of privilege, denial of service, information disclosure, loss of confidentiality, and loss of integrity on affected systems.

Technical Details of CVE-2019-6322

This section provides more in-depth technical insights into the CVE.

Vulnerability Description

The flaw in the Workstation BIOS could be exploited to modify the runtime BIOS code if the TPM is deactivated, affecting the system's security and integrity.

Affected Systems and Versions

        HP Z4 G4 Workstation (Xeon W) before version 1.70
        HP Z4 G4 Workstation (Xeon W) (Linux) before version 1.70
        HP Z4 G4 Core-X Workstation before version 1.70
        HP Z4 G4 Core-X Workstation (Linux) before version 1.70
        HP Z6 G4 Workstation before version 1.71
        HP Z6 G4 Workstation (Linux) before version 1.71
        HP Z8 G4 Workstation before version 1.71
        HP Z8 G4 Workstation (Linux) before version 1.71

Exploitation Mechanism

The vulnerability can be exploited when the TPM is disabled, allowing attackers to tamper with the BIOS code and potentially compromise the system's security.

Mitigation and Prevention

Protecting systems from CVE-2019-6322 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Ensure the TPM is enabled on affected workstations to mitigate the risk of unauthorized BIOS code changes.
        Monitor for any suspicious activities that could indicate an exploit of the vulnerability.

Long-Term Security Practices

        Regularly update BIOS firmware to patched versions that address the vulnerability.
        Implement strong access controls and security measures to prevent unauthorized access to system settings.

Patching and Updates

        HP has released updated BIOS versions (1.70 for Z4 G4 Workstations and 1.71 for Z6 and Z8 G4 Workstations) to address the vulnerability. It is crucial to apply these patches promptly to secure the affected systems.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now