4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
Unauthorized access
A potential security vulnerability has been identified with the HP Smart Zero Client. This vulnerability could be exploited by a local user on the device to gain unauthorized access.
HP has provided updated operating system software for HP Smart Zero Core OS v4.3 and v4.3.1. Please choose one of three methods below to resolve the issue on the thin client.
Issue can be solved by one of three update methods, available from hp.com.
HISTORY
Version:1 (rev.1) - 24 June 2013 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer’s patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to [email protected].
Report: To report a potential security vulnerability with any HP supported product, send Email to: [email protected]
**Subscribe:**To initiate a subscription to receive future HP Security Bulletin alerts via Email: <http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins>
Security Bulletin Archive: A list of recently released Security Bulletins is available here: <https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive>
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX