7.8
HIGH
CVE-2015-5368
HP lt4112 LTE/HSPA+ Gobi 4G Module远程代码执行和 denial-of-service Vulnerability
Description

The HP lt4112 LTE/HSPA+ Gobi 4G module with firmware before 12.500.00.15.1803 on EliteBook, ElitePad, Elite, ProBook, Spectre, ZBook, and mt41 Thin Client devices allows remote attackers to modify data or cause a denial of service, or execute arbitrary code, via unspecified vectors.

INFO

Published Date :

Aug. 27, 2015, 3:59 p.m.

Last Modified :

Nov. 21, 2024, 2:32 a.m.

Remotely Exploitable :

Yes !

Impact Score :

7.8

Exploitability Score :

8.6
Affected Products

The following products are affected by CVE-2015-5368 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Hp hspa\+_gobi_4g
2 Hp lt4112_lte
3 Hp elite_x2_1010_g2
4 Hp elitebook_1040_g1
5 Hp elitebook_1040_g2
6 Hp elitebook_820_g1
7 Hp elitebook_820_g2
8 Hp elitebook_825_g2
9 Hp elitebook_840_g1
10 Hp elitebook_840_g2
11 Hp elitebook_845_g1
12 Hp elitebook_850_g1
13 Hp elitebook_850_g2
14 Hp elitebook_855_g1
15 Hp elitebook_folio_9470m
16 Hp elitebook_revolve_810_g1
17 Hp elitebook_revolve_810_g2
18 Hp elitepad_1000_g2
19 Hp mt41_thin_client
20 Hp probook_430_g1
21 Hp probook_430_g2
22 Hp probook_440_g0
23 Hp probook_440_g1
24 Hp probook_440_g2
25 Hp probook_450_g0
26 Hp probook_450_g1
27 Hp probook_450_g2
28 Hp probook_640_g1
29 Hp probook_645_g1
30 Hp probook_650_g1
31 Hp probook_655_g1
32 Hp probook_x2_620_g1
33 Hp spectre_x2_13-smb_pro
34 Hp zbook_14
35 Hp zbook_14_g2
36 Hp zbook_15
37 Hp zbook_15_g2
38 Hp zbook_15u
39 Hp zbook_17_g2

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2015-5368 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2015-5368 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://www.securityfocus.com/bid/76176
    Added Reference http://www.securitytracker.com/id/1033414
    Added Reference http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446601.htm
    Added Reference https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272
    Added Reference https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Sep. 20, 2017

    Action Type Old Value New Value
    Added Reference http://www.securitytracker.com/id/1033414 [No Types Assigned]
  • CVE Modified by [email protected]

    Dec. 07, 2016

    Action Type Old Value New Value
    Added Reference http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-446601.htm [No Types Assigned]
  • CVE Modified by [email protected]

    Dec. 01, 2016

    Action Type Old Value New Value
    Added Reference https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 28, 2016

    Action Type Old Value New Value
    Added Reference http://www.securityfocus.com/bid/76176 [No Types Assigned]
  • Modified Analysis by [email protected]

    Aug. 28, 2015

    Action Type Old Value New Value
    Added CPE Configuration Configuration 1 AND OR *cpe:2.3:a:hp:hspa\+_gobi_4g:12.500.00.15.1802:*:*:*:*:*:*:* *cpe:2.3:a:hp:lt4112_lte:12.500.00.15.1802:*:*:*:*:*:*:* OR *cpe:2.3:h:hp:elitebook_820_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_820_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_825_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_840_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_840_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_845_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_850_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_850_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_855_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_1040_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_1040_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_folio_9470m:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_revolve_810_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitebook_revolve_810_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elitepad_1000_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:elite_x2_1010_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_430_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_430_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_440_g0:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_440_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_440_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_450_g0:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_450_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_450_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_640_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_645_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_650_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_655_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:probook_x2_620_g1:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:spectre_x2_13-smb_pro:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:zbook_14:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:zbook_14_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:zbook_15:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:zbook_15_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:zbook_15u:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:zbook_17_g2:*:*:*:*:*:*:*:* *cpe:2.3:h:hp:mt41_thin_client:*:*:*:*:*:*:*:*
    Added CVSS V2 (AV:N/AC:M/Au:N/C:N/I:P/A:C)
    Changed Reference Type https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272 No Types Assigned https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773272 Advisory
    Added CWE CWE-119
  • Initial Analysis by [email protected]

    Aug. 28, 2015

    Action Type Old Value New Value
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

4.62 }} 0.02%

score

0.92461

percentile

CVSS2 - Vulnerability Scoring System
Access Vector
Access Complexity
Authentication
Confidentiality
Integrity
Availability