6.4

CVE-2022-48220

Potential vulnerabilities have been identified in certain HP Desktop PC products using the HP TamperLock feature, which might allow intrusion detection bypass via a physical attack. HP is releasing firmware and guidance to mitigate these potential vulnerabilities.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorhp
Product elite_tower_880_g9_desktop_pc
Default Statusunknown
Version < 02.12.02_rev1
Version 0
Status affected
Vendorhp
Product elitedesk_880_g8_tower_pc
Default Statusunknown
Version < 02.14.00_rev1
Version 0
Status affected
Vendorhp
Product eliteone_800_g8_27_all-in-one_pc
Default Statusunknown
Version < 02.14.00_rev1
Version 0
Status affected
Vendorhp
Product pro_mini_400_g9_desktop_pc
Default Statusunknown
Version < 02.12.02_rev1
Version 0
Status affected
Vendorhp
Product pro_sff_400_g9_desktop_pc
Default Statusunknown
Version < 02.12.02_rev1
Version 0
Status affected
Vendorhp
Product pro_tower_480_g9_desktop_pc
Default Statusunknown
Version < 02.12.02_rev1
Version 0
Status affected
Vendorhp
Product z1_g9_tower_desktop_pc
Default Statusunknown
Version < 02.12.02_rev1
Version 0
Status affected
Vendorhp
Product z2_small_form_factor_g9_workstation
Default Statusunknown
Version < 01.06.05_rev1
Version 0
Status affected
Vendorhp
Product z2_mini_g9_workstation
Default Statusunknown
Version < 2.02.02_rev1
Version 0
Status affected
Vendorhp
Product z2_tower_g9_workstation
Default Statusunknown
Version < 2.02.02_rev1
Version 0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.067
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.4 0.9 5.5
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
CWE-203 Observable Discrepancy

The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.