First published: Wed May 29 2019(Updated: )
HP has identified a security vulnerability with some versions of Workstation BIOS (UEFI Firmware) where the runtime BIOS code could be tampered with if the TPM is disabled. This vulnerability relates to Workstations whose TPM is enabled by default.
Credit: hp-security-alert@hp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HP z4 g4 core-x Workstation Firmware | <1.70 | |
HP Z4 G4 Core-X Workstation Firmware | ||
HP Z4 G4 Core-X Workstation Firmware | <1.70 | |
HP Z4 G4 Workstation | ||
HP Z6 G4 Workstation | <1.71 | |
HP Z6 G4 Workstation Firmware | ||
HP z8 G4 Workstation Firmware | <1.71 | |
HP Z8 G4 Workstation Firmware | ||
HP Z4 G4 Workstation Firmware | <1.70 | |
HP z4 g4 core-x Workstation Firmware | <1.70 | |
HP z6 g4 Workstation Firmware linux | <1.71 | |
HP z8 G4 Workstation Firmware | <1.71 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security vulnerability is CVE-2019-6322.
The severity level of CVE-2019-6322 is critical with a severity value of 6.8.
The HP Z4 G4 Workstation Firmware up to version 1.70 and the HP Z6 G4 Workstation Firmware up to version 1.71 are affected by CVE-2019-6322.
To fix the CVE-2019-6322 vulnerability, update the Workstation BIOS (UEFI Firmware) to a version that is not vulnerable.
More information about CVE-2019-6322 can be found at this [link](https://support.hp.com/us-en/document/c06318199).