7.8
Advisory Published
Updated

CVE-2022-28638

First published: Tue Sep 20 2022(Updated: )

An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.

Credit: security-alert@hpe.com

Affected SoftwareAffected VersionHow to fix
HPE Integrated Lights-Out 5 firmware<2.72
HPE Apollo 4200 Gen10 Server
HP Apollo 4500 Firmware
HPE Apollo R2000 Chassis
HPE Apollo 2000 System
HPE Apollo 4200 Gen10 Plus System
HP Apollo 4510 System
HPE Apollo 6500
HPE Apollo n2600 Gen10 Plus
HPE Apollo n2800 Gen10 Plus
HPE Apollo R2600 Gen10
HPE Apollo r2800 Gen10
HPE Edgeline E920 Server Blade
HPE Edgeline E920d Server Blade
HPE Edgeline E920t Server Blade
HP Integrated Lights-Out 5 firmware
HPE ProLiant BL460c Gen10 Server Blade
HPE ProLiant DL110 Gen10 Plus Telco Server
HP ProLiant DL160 Gen10 Server
HPE ProLiant DL180 Gen10 Server
HPE ProLiant DL20 Gen10 Plus Server
HPE ProLiant DL20 Gen10 Plus Server
HPE ProLiant DL325 Gen10 Plus Server
HPE ProLiant DL325 Gen10 Plus v2 Server
HPE ProLiant DL325 Gen10 Server
HPE ProLiant DL345 Gen10 Plus Server
HPE ProLiant DL360 Gen10 Plus Server
HP ProLiant DL360 Gen10
HPE ProLiant DL365 Gen10 Plus Server
HPE ProLiant DL380 Gen10 Plus Server
HP ProLiant DL380 Gen10
HPE ProLiant DX385 Gen10 Plus Server
HPE ProLiant DL385 Gen10 Plus v2 Server
HPE ProLiant DL385 Gen10 Server
HPE proliant dl560 gen10 server
HPE ProLiant DL580 Gen10 Server Firmware
HPE ProLiant DX170R Gen10 Server
HPE ProLiant DX190R Gen10 Server
HPE ProLiant DX220N Gen10 Plus Server
HPE ProLiant DX325 Gen10 Plus v2 Server
HPE ProLiant DX360 Gen10 Plus Server
HPE ProLiant DX360 Gen10 Server
HPE ProLiant DX380 Gen10 Plus Server
HPE ProLiant DX380 Gen10 Server
HPE ProLiant DX385 Gen10 Plus Server
HPE ProLiant DX385 Gen10 Plus v2 Server
HPE ProLiant DX4200 Gen10 Server
HPE ProLiant DX560 Gen10 Server
HPE ProLiant E910 Server Blade
HPE ProLiant E910T Server Blade
HPE ProLiant m750 Server Blade
HPE ProLiant MicroServer Gen10 Plus v2
HP ProLiant ML110 Gen10 Server
HPE ProLiant ML30 Gen10 Plus Server
HPE ProLiant ML30 Gen10
HP ProLiant ML350 Gen10 Server
HP ProLiant xl170r Gen10
HP ProLiant xl190r Gen10
HPE ProLiant XL220n Gen10 Plus Server
HPE ProLiant XL225N Gen10 Plus 1U Node
HP ProLiant XL230k Gen10 Server
HPE ProLiant XL270d Gen10 Server
HPE ProLiant XL290n Gen10 Plus Server
HPE ProLiant XL420 Gen10 Server
HPE ProLiant XL450 Gen10 Server Firmware
HPE ProLiant XL645D Gen10 Plus Server
HPE ProLiant XL675d Gen10 Plus Server
HPE ProLiant XL925 Gen10 Plus 1U 4-Node Configure-to-Order Server
HPE Storage File Controller
HPE Storage Performance File Controller
HPE StoreEasy 1460 Storage
HPE StoreEasy 1560 Storage
HPE StoreEasy 1660 Expanded Storage
HPE storeeasy 1660 performance storage
HPE StoreEasy 1660 Expanded Storage
HPE StoreEasy 1860 Performance Storage
HPE StoreEasy 1860 Performance Storage

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-28638?

    The severity of CVE-2022-28638 is classified as high due to its potential for local information disclosure and arbitrary code execution.

  • How do I fix CVE-2022-28638?

    To fix CVE-2022-28638, upgrade the HPE Integrated Lights-Out 5 firmware to version 2.72 or later.

  • What devices are affected by CVE-2022-28638?

    CVE-2022-28638 affects the HPE Integrated Lights-Out 5 firmware up to version 2.71.

  • What impact does CVE-2022-28638 have on systems?

    CVE-2022-28638 can lead to a loss of confidentiality, integrity, and availability in affected systems.

  • Is there a workaround for CVE-2022-28638?

    There are no known workarounds for CVE-2022-28638; updating the firmware is recommended for mitigation.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203