4.6
MEDIUM
CVE-2017-2751
Lenovo Notebooks BIOS Password Extraction Vulnerability
Description

A BIOS password extraction vulnerability has been reported on certain consumer notebooks with firmware F.22 and others. The BIOS password was stored in CMOS in a way that allowed it to be extracted. This applies to consumer notebooks launched in early 2014.

INFO

Published Date :

Oct. 3, 2018, 8:29 p.m.

Last Modified :

Oct. 3, 2019, 12:03 a.m.

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

0.9
Public PoC/Exploit Available at Github

CVE-2017-2751 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2017-2751 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Hp hp_240_g1_firmware
2 Hp hp_245_g1_firmware
3 Hp hp_1000-1300_firmware
4 Hp hp_250_g1_notebook_pc_firmware
5 Hp hp_255_g1_notebook_pc_firmware
6 Hp hp_envy_15-j000_firmware
7 Hp hp_envy_15-j100_firmware
8 Hp hp_pavilion_15-n000_firmware
9 Hp hp_246_firmware
10 Hp hp_455_firmware
11 Hp hp_envy_17_j100_firmware
12 Hp hp_envy_17-j100_leap_motion_se_firmware
13 Hp hp_split_13-g200_firmware
14 Hp hp_envy_100_firmware
15 Hp hp_pavilion_14-n000_firmware
16 Hp hp_envy_14-k100_firmware
17 Hp hp_spectre_x2_13-smb_pro_firmware
18 Hp hp_spectre_13-h200_firmware
19 Hp hp_pavilion_15-n200_firmware
20 Hp hp_pavilion_15-n300_firmware
21 Hp hp_envy_m6-n000_firmware
22 Hp hp_255_g3_firmware
23 Hp hp_14-g000_firmware
24 Hp hp_pavilion_11-n000_firmware
25 Hp hp_15-r000_firmware
26 Hp hp_15-r500_firmware
27 Hp hp_pavilion_10-f000_firmware
28 Hp hp_g14-a000_firmware
29 Hp hp_14-r000_firmware
30 Hp hp_240_g3_firmware
31 Hp hp_246_g3_firmware
32 Hp compaq_cq45-900_firmware
33 Hp compaq_14-h000_firmware
34 Hp compaq_14-s000_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2017-2751.

URL Resource
https://support.hp.com/us-en/document/c05913581 Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Mini-paper on CVE-2017-2751, HP EFI password extraction.

TeX Makefile

Updated: 1 year, 5 months ago
1 stars 0 fork 0 watcher
Born at : Jan. 19, 2020, 12:41 a.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2017-2751 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2017-2751 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CWE Remap by [email protected]

    Oct. 03, 2019

    Action Type Old Value New Value
    Changed CWE CWE-255 CWE-255 CWE-522
  • Initial Analysis by [email protected]

    Jan. 08, 2019

    Action Type Old Value New Value
    Added CVSS V2 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
    Added CVSS V3 AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type https://support.hp.com/us-en/document/c05913581 No Types Assigned https://support.hp.com/us-en/document/c05913581 Vendor Advisory
    Added CWE CWE-255
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_240_g1_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.48 OR cpe:2.3:h:hp:hp_240_g1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_245_g1_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.48 OR cpe:2.3:h:hp:hp_245_g1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_1000-1300_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.48 OR cpe:2.3:h:hp:hp_1000-1300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_250_g1_notebook_pc_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.47 OR cpe:2.3:h:hp:hp_250_g1_notebook_pc:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_255_g1_notebook_pc_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.47 OR cpe:2.3:h:hp:hp_255_g1_notebook_pc:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_15-j000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.22 OR cpe:2.3:h:hp:hp_envy_15-j000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_15-j100_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.71 OR cpe:2.3:h:hp:hp_envy_15-j100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_15-n000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.72 OR cpe:2.3:h:hp:hp_pavilion_15-n000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_246_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.04 OR cpe:2.3:h:hp:hp_246:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_455_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.08 OR cpe:2.3:h:hp:hp_455:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_17_j100_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.71 OR cpe:2.3:h:hp:hp_envy_17_j100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_17-j100_leap_motion_se_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.71 OR cpe:2.3:h:hp:hp_envy_17-j100_leap_motion_se:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_split_13-g200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.25 OR cpe:2.3:h:hp:hp_split_13-g200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_100_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.22 OR cpe:2.3:h:hp:hp_envy_100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_14-n000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.72 OR cpe:2.3:h:hp:hp_pavilion_14-n000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_14-k100_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.22 OR cpe:2.3:h:hp:hp_envy_14-k100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_spectre_x2_13-smb_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.25 OR cpe:2.3:h:hp:hp_spectre_x2_13-smb_pro:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_spectre_13-h200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.25 OR cpe:2.3:h:hp:hp_spectre_13-h200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_15-n200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.72 OR cpe:2.3:h:hp:hp_pavilion_15-n200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_15-n300_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.72 OR cpe:2.3:h:hp:hp_pavilion_15-n300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_m6-n000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.26 OR cpe:2.3:h:hp:hp_envy_m6-n000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_255_g3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.45 OR cpe:2.3:h:hp:hp_255_g3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_14-g000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.45 OR cpe:2.3:h:hp:hp_14-g000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_11-n000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.2e OR cpe:2.3:h:hp:hp_pavilion_11-n000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_15-r000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.43 OR cpe:2.3:h:hp:hp_15-r000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_15-r500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.43 OR cpe:2.3:h:hp:hp_15-r500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_10-f000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.0e OR cpe:2.3:h:hp:hp_pavilion_10-f000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_g14-a000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.06 OR cpe:2.3:h:hp:hp_g14-a000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_14-r000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.43 OR cpe:2.3:h:hp:hp_14-r000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_240_g3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.43 OR cpe:2.3:h:hp:hp_240_g3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_246_g3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.43 OR cpe:2.3:h:hp:hp_246_g3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:compaq_cq45-900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:hp:compaq_cq45-900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:compaq_14-h000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:hp:compaq_14-h000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:compaq_14-s000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:hp:compaq_14-s000:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2017-2751 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.07 }} 0.00%

score

0.28533

percentile

CVSS30 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability