CVE-2015-0949

The System Management Mode (SMM) implementation in Dell Latitude E6430 BIOS Revision A09, HP EliteBook 850 G1 BIOS revision L71 Ver. 01.09, and possibly other BIOS implementations does not ensure that function calls operate on SMRAM memory locations, which allows local users to bypass the Secure Boot protection mechanism and gain privileges by leveraging write access to physical memory.
References
Link Resource
http://www.kb.cert.org/vuls/id/631788 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/631788 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dell:latitude_e6430_firmware:a09:*:*:*:*:*:*:*
cpe:2.3:h:dell:latitude_e6430:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:hp:elitebook_850_g1_firmware:01.09:*:*:*:*:*:*:*
cpe:2.3:h:hp:elitebook_850_g1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/631788 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/631788 - Third Party Advisory, US Government Resource

Information

Published : 2020-01-30 21:15

Updated : 2024-11-21 02:24


NVD link : CVE-2015-0949

Mitre link : CVE-2015-0949

CVE.ORG link : CVE-2015-0949


JSON object : View

Products Affected

dell

  • latitude_e6430
  • latitude_e6430_firmware

hp

  • elitebook_850_g1_firmware
  • elitebook_850_g1
CWE
CWE-269

Improper Privilege Management