First published: Thu Aug 11 2022(Updated: )
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A low privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
HPE Integrated Lights-Out 5 firmware | <2.71 | |
HPE Apollo 2000 System | ||
HPE Apollo 4200 Gen10 Plus System | ||
HP Apollo 4510 System | ||
HPE Apollo 6500 Gen10 Plus | ||
HPE Apollo 6500 Gen10 Plus | ||
HPE Apollo n2600 Gen10 Plus | ||
HPE Apollo n2800 Gen10 Plus | ||
HPE Apollo R2600 Gen10 | ||
HPE Apollo r2800 Gen10 | ||
HPE Edgeline E920 Server Blade | ||
HPE Edgeline E920d Server Blade | ||
HPE Edgeline E920t Server Blade | ||
HPE ProLiant BL460c Gen10 Server Blade | ||
HPE ProLiant DL110 Gen10 Plus Telco Server | ||
HP ProLiant DL120 Gen10 Server | ||
HP ProLiant DL160 Gen10 Server | ||
HPE ProLiant DL180 Gen10 Server | ||
HPE ProLiant DL20 Gen10 Plus Server | ||
HPE ProLiant DL20 Gen10 Plus Server | ||
HPE ProLiant DL325 Gen10 Plus Server | ||
HPE ProLiant DL325 Gen10 Plus v2 Server | ||
HPE ProLiant DL325 Gen10 Server | ||
HPE ProLiant DL345 Gen10 Plus Server | ||
HPE ProLiant DL360 Gen10 Plus Server | ||
HP ProLiant DL360 Gen10 | ||
HPE ProLiant DL365 Gen10 Plus Server | ||
HPE ProLiant DL380 Gen10 Plus Server | ||
HP ProLiant DL380 Gen10 | ||
HPE ProLiant DX385 Gen10 Plus Server | ||
HPE ProLiant DL385 Gen10 Plus v2 Server | ||
HPE ProLiant DL385 Gen10 Server | ||
HPE proliant dl560 gen10 server | ||
HPE ProLiant DL580 Gen10 Server Firmware | ||
HPE ProLiant DX170R Gen10 Server | ||
HPE ProLiant DX190R Gen10 Server | ||
HPE ProLiant DX220N Gen10 Plus Server | ||
HPE ProLiant DX325 Gen10 Plus v2 Server | ||
HPE ProLiant DX360 Gen10 Plus Server | ||
HPE ProLiant DX360 Gen10 Server | ||
HPE ProLiant DX380 Gen10 Plus Server | ||
HPE ProLiant DX380 Gen10 Server | ||
HPE ProLiant DX385 Gen10 Plus Server | ||
HPE ProLiant DX385 Gen10 Plus v2 Server | ||
HPE ProLiant DX4200 Gen10 Server | ||
HPE ProLiant DX560 Gen10 Server | ||
HPE ProLiant E910 Server Blade | ||
HPE ProLiant E910T Server Blade | ||
HPE ProLiant m750 Server Blade | ||
HPE ProLiant MicroServer Gen10 Plus v2 | ||
HP ProLiant ML110 Gen10 Server | ||
HPE ProLiant ML30 Gen10 Plus Server | ||
HPE ProLiant ML30 Gen10 | ||
HP ProLiant ML350 Gen10 Server | ||
HP ProLiant xl170r Gen10 | ||
HP ProLiant xl190r Gen10 | ||
HPE ProLiant XL220n Gen10 Plus Server | ||
HPE ProLiant XL225N Gen10 Plus 1U Node | ||
HP ProLiant XL230k Gen10 Server | ||
HPE ProLiant XL270d Gen10 Server | ||
HPE ProLiant XL290n Gen10 Plus Server | ||
HPE ProLiant XL420 Gen10 Server | ||
HPE ProLiant XL450 Gen10 Server Firmware | ||
HPE ProLiant XL645D Gen10 Plus Server | ||
HPE ProLiant XL675d Gen10 Plus Server | ||
HPE ProLiant XL925 Gen10 Plus 1U 4-Node Configure-to-Order Server | ||
HPE Storage File Controller | ||
HPE Storage Performance File Controller | ||
HPE StoreEasy 1460 Storage | ||
HPE StoreEasy 1560 Storage | ||
HPE StoreEasy 1660 Expanded Storage | ||
HPE storeeasy 1660 performance storage | ||
HPE StoreEasy 1660 Expanded Storage | ||
HPE StoreEasy 1860 Performance Storage | ||
HPE StoreEasy 1860 Performance Storage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28629 is a local arbitrary code execution vulnerability in HPE Integrated Lights-Out 5 (iLO 5) firmware versions prior to 2.71.
CVE-2022-28629 has a severity rating of 7.8, classified as high.
A low privileged user could locally exploit CVE-2022-28629 to execute arbitrary code, resulting in a complete loss of confidentiality, integrity, and availability.
HPE Integrated Lights-Out 5 (iLO 5) firmware versions prior to 2.71 are affected by CVE-2022-28629.
For more information about CVE-2022-28629, you can visit the reference provided by HPE: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04333en_us.