First published: Tue Sep 20 2022(Updated: )
A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
HPE Integrated Lights-Out 5 firmware | <2.72 | |
HPE Apollo 4200 Gen10 Server | ||
HP Apollo 4500 Firmware | ||
HPE Apollo R2000 Chassis | ||
HPE Apollo 2000 System | ||
HPE Apollo 4200 Gen10 Plus System | ||
HP Apollo 4510 System | ||
HPE Apollo 6500 | ||
HPE Apollo n2600 Gen10 Plus | ||
HPE Apollo n2800 Gen10 Plus | ||
HPE Apollo R2600 Gen10 | ||
HPE Apollo r2800 Gen10 | ||
HPE Edgeline E920 Server Blade | ||
HPE Edgeline E920d Server Blade | ||
HPE Edgeline E920t Server Blade | ||
HP Integrated Lights-Out 5 firmware | ||
HPE ProLiant BL460c Gen10 Server Blade | ||
HPE ProLiant DL110 Gen10 Plus Telco Server | ||
HP ProLiant DL160 Gen10 Server | ||
HPE ProLiant DL180 Gen10 Server | ||
HPE ProLiant DL20 Gen10 Plus Server | ||
HPE ProLiant DL20 Gen10 Plus Server | ||
HPE ProLiant DL325 Gen10 Plus Server | ||
HPE ProLiant DL325 Gen10 Plus v2 Server | ||
HPE ProLiant DL325 Gen10 Server | ||
HPE ProLiant DL345 Gen10 Plus Server | ||
HPE ProLiant DL360 Gen10 Plus Server | ||
HP ProLiant DL360 Gen10 | ||
HPE ProLiant DL365 Gen10 Plus Server | ||
HPE ProLiant DL380 Gen10 Plus Server | ||
HP ProLiant DL380 Gen10 | ||
HPE ProLiant DX385 Gen10 Plus Server | ||
HPE ProLiant DL385 Gen10 Plus v2 Server | ||
HPE ProLiant DL385 Gen10 Server | ||
HPE proliant dl560 gen10 server | ||
HPE ProLiant DL580 Gen10 Server Firmware | ||
HPE ProLiant DX170R Gen10 Server | ||
HPE ProLiant DX190R Gen10 Server | ||
HPE ProLiant DX220N Gen10 Plus Server | ||
HPE ProLiant DX325 Gen10 Plus v2 Server | ||
HPE ProLiant DX360 Gen10 Plus Server | ||
HPE ProLiant DX360 Gen10 Server | ||
HPE ProLiant DX380 Gen10 Plus Server | ||
HPE ProLiant DX380 Gen10 Server | ||
HPE ProLiant DX385 Gen10 Plus Server | ||
HPE ProLiant DX385 Gen10 Plus v2 Server | ||
HPE ProLiant DX4200 Gen10 Server | ||
HPE ProLiant DX560 Gen10 Server | ||
HPE ProLiant E910 Server Blade | ||
HPE ProLiant E910T Server Blade | ||
HPE ProLiant m750 Server Blade | ||
HPE ProLiant MicroServer Gen10 Plus v2 | ||
HP ProLiant ML110 Gen10 Server | ||
HPE ProLiant ML30 Gen10 Plus Server | ||
HPE ProLiant ML30 Gen10 | ||
HP ProLiant ML350 Gen10 Server | ||
HP ProLiant xl170r Gen10 | ||
HP ProLiant xl190r Gen10 | ||
HPE ProLiant XL220n Gen10 Plus Server | ||
HPE ProLiant XL225N Gen10 Plus 1U Node | ||
HP ProLiant XL230k Gen10 Server | ||
HPE ProLiant XL270d Gen10 Server | ||
HPE ProLiant XL290n Gen10 Plus Server | ||
HPE ProLiant XL420 Gen10 Server | ||
HPE ProLiant XL450 Gen10 Server Firmware | ||
HPE ProLiant XL645D Gen10 Plus Server | ||
HPE ProLiant XL675d Gen10 Plus Server | ||
HPE ProLiant XL925 Gen10 Plus 1U 4-Node Configure-to-Order Server | ||
HPE Storage File Controller | ||
HPE Storage Performance File Controller | ||
HPE StoreEasy 1460 Storage | ||
HPE StoreEasy 1560 Storage | ||
HPE StoreEasy 1660 Expanded Storage | ||
HPE storeeasy 1660 performance storage | ||
HPE StoreEasy 1660 Expanded Storage | ||
HPE StoreEasy 1860 Performance Storage | ||
HPE StoreEasy 1860 Performance Storage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28639 is classified as a remote adjacent denial of service (DoS) and potential arbitrary code execution vulnerability.
To address CVE-2022-28639, update the HPE Integrated Lights-Out 5 (iLO 5) firmware to version 2.72 or newer.
CVE-2022-28639 specifically affects HPE Integrated Lights-Out 5 firmware prior to version 2.72.
Yes, CVE-2022-28639 could potentially lead to a loss of confidentiality, integrity, and availability.
Currently, there are no known workarounds for CVE-2022-28639, so updating the firmware is the recommended action.