4.6
MEDIUM CVSS 3.0
CVE-2017-2751
Lenovo Notebooks BIOS Password Extraction Vulnerability
Description

A BIOS password extraction vulnerability has been reported on certain consumer notebooks with firmware F.22 and others. The BIOS password was stored in CMOS in a way that allowed it to be extracted. This applies to consumer notebooks launched in early 2014.

INFO

Published Date :

Oct. 3, 2018, 8:29 p.m.

Last Modified :

Nov. 21, 2024, 3:24 a.m.

Remotely Exploit :

No
Affected Products

The following products are affected by CVE-2017-2751 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Hp hp_240_g1_firmware
2 Hp hp_245_g1_firmware
3 Hp hp_1000-1300_firmware
4 Hp hp_250_g1_notebook_pc_firmware
5 Hp hp_255_g1_notebook_pc_firmware
6 Hp hp_envy_15-j000_firmware
7 Hp hp_envy_15-j100_firmware
8 Hp hp_pavilion_15-n000_firmware
9 Hp hp_246_firmware
10 Hp hp_455_firmware
11 Hp hp_envy_17_j100_firmware
12 Hp hp_envy_17-j100_leap_motion_se_firmware
13 Hp hp_split_13-g200_firmware
14 Hp hp_envy_100_firmware
15 Hp hp_pavilion_14-n000_firmware
16 Hp hp_envy_14-k100_firmware
17 Hp hp_spectre_x2_13-smb_pro_firmware
18 Hp hp_spectre_13-h200_firmware
19 Hp hp_pavilion_15-n200_firmware
20 Hp hp_pavilion_15-n300_firmware
21 Hp hp_envy_m6-n000_firmware
22 Hp hp_255_g3_firmware
23 Hp hp_14-g000_firmware
24 Hp hp_pavilion_11-n000_firmware
25 Hp hp_15-r000_firmware
26 Hp hp_15-r500_firmware
27 Hp hp_pavilion_10-f000_firmware
28 Hp hp_g14-a000_firmware
29 Hp hp_14-r000_firmware
30 Hp hp_240_g3_firmware
31 Hp hp_246_g3_firmware
32 Hp compaq_cq45-900_firmware
33 Hp compaq_14-h000_firmware
34 Hp compaq_14-s000_firmware
35 Hp hp_240_g1
36 Hp hp_245_g1
37 Hp hp_1000-1300
38 Hp hp_250_g1_notebook_pc
39 Hp hp_255_g1_notebook_pc
40 Hp hp_envy_15-j000
41 Hp hp_envy_15-j100
42 Hp hp_pavilion_15-n000
43 Hp hp_246
44 Hp hp_455
45 Hp hp_envy_17_j100
46 Hp hp_envy_17-j100_leap_motion_se
47 Hp hp_split_13-g200
48 Hp hp_envy_100
49 Hp hp_pavilion_14-n000
50 Hp hp_envy_14-k100
51 Hp hp_spectre_x2_13-smb_pro
52 Hp hp_spectre_13-h200
53 Hp hp_pavilion_15-n200
54 Hp hp_pavilion_15-n300
55 Hp hp_envy_m6-n000
56 Hp hp_255_g3
57 Hp hp_14-g000
58 Hp hp_pavilion_11-n000
59 Hp hp_15-r000
60 Hp hp_15-r500
61 Hp hp_pavilion_10-f000
62 Hp hp_g14-a000
63 Hp hp_14-r000
64 Hp hp_240_g3
65 Hp hp_246_g3
66 Hp compaq_cq45-900
67 Hp compaq_14-h000
68 Hp compaq_14-s000
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 2.0 LOW [email protected]
CVSS 3.0 MEDIUM [email protected]
Public PoC/Exploit Available at Github

CVE-2017-2751 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2017-2751.

URL Resource
https://support.hp.com/us-en/document/c05913581 Vendor Advisory
https://support.hp.com/us-en/document/c05913581 Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2017-2751 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Mini-paper on CVE-2017-2751, HP EFI password extraction.

TeX Makefile

Updated: 2 years, 5 months ago
1 stars 0 fork 0 watcher
Born at : Jan. 19, 2020, 12:41 a.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2017-2751 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2017-2751 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://support.hp.com/us-en/document/c05913581
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CWE Remap by [email protected]

    Oct. 03, 2019

    Action Type Old Value New Value
    Changed CWE CWE-255 CWE-255 CWE-522
  • Initial Analysis by [email protected]

    Jan. 08, 2019

    Action Type Old Value New Value
    Added CVSS V2 (AV:L/AC:L/Au:N/C:P/I:N/A:N)
    Added CVSS V3 AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type https://support.hp.com/us-en/document/c05913581 No Types Assigned https://support.hp.com/us-en/document/c05913581 Vendor Advisory
    Added CWE CWE-255
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_240_g1_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.48 OR cpe:2.3:h:hp:hp_240_g1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_245_g1_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.48 OR cpe:2.3:h:hp:hp_245_g1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_1000-1300_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.48 OR cpe:2.3:h:hp:hp_1000-1300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_250_g1_notebook_pc_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.47 OR cpe:2.3:h:hp:hp_250_g1_notebook_pc:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_255_g1_notebook_pc_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.47 OR cpe:2.3:h:hp:hp_255_g1_notebook_pc:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_15-j000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.22 OR cpe:2.3:h:hp:hp_envy_15-j000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_15-j100_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.71 OR cpe:2.3:h:hp:hp_envy_15-j100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_15-n000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.72 OR cpe:2.3:h:hp:hp_pavilion_15-n000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_246_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.04 OR cpe:2.3:h:hp:hp_246:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_455_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.08 OR cpe:2.3:h:hp:hp_455:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_17_j100_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.71 OR cpe:2.3:h:hp:hp_envy_17_j100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_17-j100_leap_motion_se_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.71 OR cpe:2.3:h:hp:hp_envy_17-j100_leap_motion_se:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_split_13-g200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.25 OR cpe:2.3:h:hp:hp_split_13-g200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_100_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.22 OR cpe:2.3:h:hp:hp_envy_100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_14-n000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.72 OR cpe:2.3:h:hp:hp_pavilion_14-n000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_14-k100_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.22 OR cpe:2.3:h:hp:hp_envy_14-k100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_spectre_x2_13-smb_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.25 OR cpe:2.3:h:hp:hp_spectre_x2_13-smb_pro:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_spectre_13-h200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.25 OR cpe:2.3:h:hp:hp_spectre_13-h200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_15-n200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.72 OR cpe:2.3:h:hp:hp_pavilion_15-n200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_15-n300_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.72 OR cpe:2.3:h:hp:hp_pavilion_15-n300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_envy_m6-n000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.26 OR cpe:2.3:h:hp:hp_envy_m6-n000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_255_g3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.45 OR cpe:2.3:h:hp:hp_255_g3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_14-g000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.45 OR cpe:2.3:h:hp:hp_14-g000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_11-n000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.2e OR cpe:2.3:h:hp:hp_pavilion_11-n000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_15-r000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.43 OR cpe:2.3:h:hp:hp_15-r000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_15-r500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.43 OR cpe:2.3:h:hp:hp_15-r500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_pavilion_10-f000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.0e OR cpe:2.3:h:hp:hp_pavilion_10-f000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_g14-a000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.06 OR cpe:2.3:h:hp:hp_g14-a000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_14-r000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.43 OR cpe:2.3:h:hp:hp_14-r000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_240_g3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.43 OR cpe:2.3:h:hp:hp_240_g3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:hp_246_g3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f.43 OR cpe:2.3:h:hp:hp_246_g3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:compaq_cq45-900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:hp:compaq_cq45-900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:compaq_14-h000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:hp:compaq_14-h000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:compaq_14-s000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:hp:compaq_14-s000:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 4.6
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Base CVSS Score: 2.1
Access Vector
Access Complexity
Authentication
Confidentiality Impact
Integrity Impact
Availability Impact
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

4.38 }} -11.89%

score

0.87920

percentile