HPE security advisory

Number: AV20-432
Date: 17 November 2020

On 16 November 2020 HPE published a Security Bulletin to address vulnerabilities in the following products:

  •  HPE Apollo 4200 Gen10 Server - System ROM prior to v2.40
  •  HPE ProLiant Gen10 Servers – multiple models with System ROM prior to v2.40
  •  HPE ProLiant Gen10 Servers – multiple models with System ROM prior to v2.20
  •  HPE ProLiant BL460c Gen10 Server Blade – System ROM prior to v2.40
  •  HPE Synergy 480 Gen10 Plus Compute Module - System ROM prior to v2.40
  •  HPE Synergy 660 Gen10 Compute Module - System ROM prior to v2.40
  •  HPE ProLiant e910 Server Blade - System ROM prior to v1.84
  •  HPE ProLiant m750 Server Blade – System ROM prior to v2.40
  •  HPE ProLiant MicroServer Gen10 Prior to System ROM to v2.40
  •  HPE StoreEasy 1000 Storage Gen10 - System ROM prior to v2.40
  •  HPE ProLiant BL460c Gen9 Server Blade - System ROM prior to v2.80
  •  HPE ProLiant BL660c Gen9 Server Blade - System ROM prior to v2.80
  •  HPE ProLiant Gen9 Servers – multiple models with System ROM prior to v2.80
  •  HPE StoreEasy 1000 Storage Gen9 - System ROM prior to v2.80
  •  HPE Synergy 620 Gen9 Compute Module - System ROM prior to v2.80
  •  HPE Synergy 680 Gen9 Compute Module - System ROM prior to v2.80
  •  HPE Superdome Flex Server TBS
  •  HPE ProLiant m510 Server Cartridge - System ROM prior to v1.84
  •  HPE Apollo 4200 Gen9 Server - System ROM prior to v2.80

Exploitation of some of the vulnerabilities could allow local privilege escalation on affected devices.

The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.

HPE Security Bulletin

https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04058en_us

Note to Readers

The Canadian Centre for Cyber Security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. (Cyber Centre) operates as part of the Communications Security Establishment.  We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure Critical infrastructureProcesses, systems, facilities, technologies, networks, assets, and services essential to the health, safety, security, or economic well-being of Canadians and the effective functioning of government. Critical infrastructure can be stand-alone or interconnected and interdependent within and across provinces, territories, and national borders. Disruptions of critical infrastructure could result in catastrophic loss of life, adverse economic effects, and significant harm to public confidence. , Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

Date modified: