The System Management Mode (SMM) implementation in Dell Latitude E6430 BIOS Revision A09, HP EliteBook 850 G1 BIOS revision L71 Ver. 01.09, and possibly other BIOS implementations does not ensure that function calls operate on SMRAM memory locations, which allows local users to bypass the Secure Boot protection mechanism and gain privileges by leveraging write access to physical memory.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/631788 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/631788 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/631788 - Third Party Advisory, US Government Resource |
Information
Published : 2020-01-30 21:15
Updated : 2024-11-21 02:24
NVD link : CVE-2015-0949
Mitre link : CVE-2015-0949
CVE.ORG link : CVE-2015-0949
JSON object : View
Products Affected
dell
- latitude_e6430
- latitude_e6430_firmware
hp
- elitebook_850_g1_firmware
- elitebook_850_g1
CWE
CWE-269
Improper Privilege Management