HPSBHF03408 rev.3 - HP PCs with HP lt4112 LTE/HSPA+ Gobi 4G Module, Remote Execution of Arbitrary Code
2015-08-18T00:00:00
ID HP:C04773272 Type hp Reporter HP Product Security Response Team Modified 2017-07-19T00:00:00
Description
Potential Security Impact
Remote execution of arbitrary code
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in certain HP notebook PCs with the HP lt4112 LTE/HSPA+ Gobi 4G Module. The vulnerabilities could be exploited remotely to allow execution of arbitrary code.
RESOLUTION
HP has provided firmware updates to address the vulnerabilities for HP PCs with the HP lt4112 LTE/HSPA+ Gobi 4G Module. To obtain the updated firmware, go to the HP Software and Drivers page for your product and and download the 12.500.00.15.1803 firmware or later (HP Softpaq # SP72435 or later).
{"id": "HP:C04773272", "bulletinFamily": "software", "title": "HPSBHF03408 rev.3 - HP PCs with HP lt4112 LTE/HSPA+ Gobi 4G Module, Remote Execution of Arbitrary Code", "description": "## Potential Security Impact\nRemote execution of arbitrary code \n\n## VULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified in certain HP notebook PCs with the HP lt4112 LTE/HSPA+ Gobi 4G Module. The vulnerabilities could be exploited remotely to allow execution of arbitrary code.\n\n## RESOLUTION\nHP has provided firmware updates to address the vulnerabilities for HP PCs with the HP lt4112 LTE/HSPA+ Gobi 4G Module. To obtain the updated firmware, go to the HP Software and Drivers page for your product and and download the 12.500.00.15.1803 firmware or later (HP Softpaq # SP72435 or later). \n", "published": "2015-08-18T00:00:00", "modified": "2017-07-19T00:00:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:C"}, "href": "https://support.hp.com/us-en/document/c04773272", "reporter": "HP Product Security Response Team", "references": [], "cvelist": ["CVE-2015-5367", "CVE-2015-5368"], "type": "hp", "lastseen": "2020-10-13T01:01:46", "edition": 2, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2015-5367", "CVE-2015-5368"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:32490", "SECURITYVULNS:VULN:14676"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20150805-01-ME906"]}], "modified": "2020-10-13T01:01:46", "rev": 2}, "score": {"value": 7.9, "vector": "NONE", "modified": "2020-10-13T01:01:46", "rev": 2}, "vulnersScore": 7.9}, "affectedSoftware": [], "scheme": null}
{"cve": [{"lastseen": "2020-10-03T12:49:53", "description": "The HP lt4112 LTE/HSPA+ Gobi 4G module with firmware before 12.500.00.15.1803 on EliteBook, ElitePad, Elite, ProBook, Spectre, ZBook, and mt41 Thin Client devices allows remote attackers to modify data or cause a denial of service, or execute arbitrary code, via unspecified vectors.", "edition": 3, "cvss3": {}, "published": "2015-08-27T15:59:00", "title": "CVE-2015-5368", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "PARTIAL", "baseScore": 7.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 7.8, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-5368"], "modified": "2017-09-20T01:29:00", "cpe": ["cpe:/h:hp:elitebook_825_g2:*", "cpe:/h:hp:zbook_14:*", "cpe:/h:hp:elitebook_820_g1:*", "cpe:/h:hp:probook_440_g0:*", "cpe:/h:hp:spectre_x2_13-smb_pro:*", "cpe:/h:hp:probook_440_g2:*", "cpe:/h:hp:mt41_thin_client:*", "cpe:/h:hp:elitebook_1040_g2:*", "cpe:/a:hp:hspa\\+_gobi_4g:12.500.00.15.1802", "cpe:/h:hp:elitebook_850_g1:*", "cpe:/h:hp:zbook_15_g2:*", "cpe:/h:hp:probook_645_g1:*", "cpe:/h:hp:elitebook_855_g1:*", "cpe:/h:hp:elitebook_840_g1:*", "cpe:/h:hp:probook_440_g1:*", "cpe:/h:hp:probook_650_g1:*", "cpe:/h:hp:zbook_14_g2:*", "cpe:/h:hp:zbook_15:*", "cpe:/h:hp:elitebook_1040_g1:*", "cpe:/h:hp:elitebook_820_g2:*", "cpe:/h:hp:probook_430_g2:*", "cpe:/h:hp:zbook_17_g2:*", "cpe:/h:hp:probook_655_g1:*", "cpe:/h:hp:probook_640_g1:*", "cpe:/a:hp:lt4112_lte:12.500.00.15.1802", "cpe:/h:hp:probook_450_g1:*", "cpe:/h:hp:elitepad_1000_g2:*", "cpe:/h:hp:probook_450_g2:*", "cpe:/h:hp:elitebook_850_g2:*", "cpe:/h:hp:probook_430_g1:*", "cpe:/h:hp:elite_x2_1010_g2:*", "cpe:/h:hp:elitebook_revolve_810_g1:*", "cpe:/h:hp:elitebook_840_g2:*", "cpe:/h:hp:probook_450_g0:*", "cpe:/h:hp:probook_x2_620_g1:*", "cpe:/h:hp:elitebook_folio_9470m:*", "cpe:/h:hp:zbook_15u:*", "cpe:/h:hp:elitebook_845_g1:*", "cpe:/h:hp:elitebook_revolve_810_g2:*"], "id": "CVE-2015-5368", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5368", "cvss": {"score": 7.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:C"}, "cpe23": ["cpe:2.3:h:hp:elitebook_840_g1:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:hspa\\+_gobi_4g:12.500.00.15.1802:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_645_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_820_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_655_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g0:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt41_thin_client:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_revolve_810_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:spectre_x2_13-smb_pro:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_820_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g1:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:lt4112_lte:12.500.00.15.1802:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x2_620_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g0:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_revolve_810_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_855_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_825_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1010_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_folio_9470m:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitepad_1000_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g2:*:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:49:53", "description": "The HP lt4112 LTE/HSPA+ Gobi 4G module with firmware before 12.500.00.15.1803 on EliteBook, ElitePad, Elite, ProBook, Spectre, ZBook, and mt41 Thin Client devices allows local users to gain privileges via unspecified vectors.", "edition": 3, "cvss3": {}, "published": "2015-08-27T15:59:00", "title": "CVE-2015-5367", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-5367"], "modified": "2017-09-20T01:29:00", "cpe": ["cpe:/h:hp:elitebook_825_g2:*", "cpe:/h:hp:zbook_14:*", "cpe:/h:hp:elitebook_820_g1:*", "cpe:/h:hp:probook_440_g0:*", "cpe:/h:hp:spectre_x2_13-smb_pro:*", "cpe:/h:hp:probook_440_g2:*", "cpe:/h:hp:mt41_thin_client:*", "cpe:/h:hp:elitebook_1040_g2:*", "cpe:/a:hp:hspa\\+_gobi_4g:12.500.00.15.1802", "cpe:/h:hp:elitebook_850_g1:*", "cpe:/h:hp:zbook_15_g2:*", "cpe:/h:hp:probook_645_g1:*", "cpe:/h:hp:elitebook_855_g1:*", "cpe:/h:hp:elitebook_840_g1:*", "cpe:/h:hp:probook_440_g1:*", "cpe:/h:hp:probook_650_g1:*", "cpe:/h:hp:zbook_14_g2:*", "cpe:/h:hp:zbook_15:*", "cpe:/h:hp:elitebook_1040_g1:*", "cpe:/h:hp:elitebook_820_g2:*", "cpe:/h:hp:probook_430_g2:*", "cpe:/h:hp:zbook_17_g2:*", "cpe:/h:hp:probook_655_g1:*", "cpe:/h:hp:probook_640_g1:*", "cpe:/a:hp:lt4112_lte:12.500.00.15.1802", "cpe:/h:hp:probook_450_g1:*", "cpe:/h:hp:elitepad_1000_g2:*", "cpe:/h:hp:probook_450_g2:*", "cpe:/h:hp:elitebook_850_g2:*", "cpe:/h:hp:probook_430_g1:*", "cpe:/h:hp:elite_x2_1010_g2:*", "cpe:/h:hp:elitebook_revolve_810_g1:*", "cpe:/h:hp:elitebook_840_g2:*", "cpe:/h:hp:probook_450_g0:*", "cpe:/h:hp:probook_x2_620_g1:*", "cpe:/h:hp:elitebook_folio_9470m:*", "cpe:/h:hp:zbook_15u:*", "cpe:/h:hp:elitebook_845_g1:*", "cpe:/h:hp:elitebook_revolve_810_g2:*"], "id": "CVE-2015-5367", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5367", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:h:hp:elitebook_840_g1:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:hspa\\+_gobi_4g:12.500.00.15.1802:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_645_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_820_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_655_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g0:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt41_thin_client:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_revolve_810_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:spectre_x2_13-smb_pro:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_820_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g1:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:lt4112_lte:12.500.00.15.1802:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x2_620_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g0:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_revolve_810_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_855_g1:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_825_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1010_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_folio_9470m:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitepad_1000_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g2:*:*:*:*:*:*:*:*"]}], "huawei": [{"lastseen": "2019-02-01T18:02:14", "bulletinFamily": "software", "cvelist": ["CVE-2015-5367", "CVE-2015-5368"], "description": "Products\n\nSwitches\nRouters\nWLAN\nServers\nSee All\n\n\n\nSolutions\n\nCloud Data Center\nEnterprise Networking\nWireless Private Network\nSolutions by Industry\nSee All\n\n\n\nServices\n\nTraining and Certification\nICT Lifecycle Services\nTechnology Services\nIndustry Solution Services\nSee All\n\n\n\nSee all offerings at e.huawei.com\n\n\n\nNeed Support ?\n\nProduct Support\nSoftware Download\nCommunity\nTools\n\nGo to Full Support", "edition": 1, "modified": "2015-11-19T00:00:00", "published": "2015-08-05T00:00:00", "id": "HUAWEI-SA-20150805-01-ME906", "href": "https://www.huawei.com/en/psirt/security-advisories/2015/hw-446601", "title": "Security Advisory-Two Security Vulnerabilities in the ME906 Wireless Module", "type": "huawei", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:11:01", "bulletinFamily": "software", "cvelist": ["CVE-2015-5367", "CVE-2015-5368"], "description": "\r\n\r\nNote: the current version of the following document is available here:\r\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/\r\ndocDisplay?docId=emr_na-c04773272\r\n\r\nSUPPORT COMMUNICATION - SECURITY BULLETIN\r\n\r\nDocument ID: c04773272\r\nVersion: 2\r\n\r\nHPSBHF03408 rev.2 - HP PCs with HP lt4112 LTE/HSPA+ Gobi 4G Module, Remote\r\nExecution of Arbitrary Code\r\n\r\nNOTICE: The information in this Security Bulletin should be acted upon as\r\nsoon as possible.\r\n\r\nRelease Date: 2015-08-26\r\nLast Updated: 2015-09-10\r\n\r\nPotential Security Impact: Remote execution of arbitrary code\r\n\r\nSource: Hewlett-Packard Company, HP Software Security Response Team\r\n\r\nVULNERABILITY SUMMARY\r\nPotential security vulnerabilities have been identified in certain HP\r\nnotebook PCs with the HP lt4112 LTE/HSPA+ Gobi 4G Module. The vulnerabilities\r\ncould be exploited remotely to allow execution of arbitrary code.\r\n\r\nReferences:\r\n\r\nCVE-2015-5367\r\nCVE-2015-5368\r\nSSRT101965\r\n\r\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.\r\nAffected Products\r\n\r\nHP EliteBook 725 G2\r\nHP EliteBook 745 G1\r\nHP EliteBook 755 G2\r\nHP EliteBook 820 G1\r\nHP EliteBook 820 G2\r\nHP EliteBook 840 G1\r\nHP EliteBook 840 G2\r\nHP EliteBook 850 G1\r\nHP EliteBook 850 G2\r\nHP EliteBook 1040 G1\r\nHP EliteBook 1040 G2\r\nHP EliteBook Folio 9470m\r\nHP EliteBook Revolve 810 G2\r\nHP EliteBook Revolve 810 G3\r\nHP ElitePad 1000 G2\r\nHP Elite x2 1011 G2\r\nHP ProBook 430 G1\r\nHP ProBook 430 G2\r\nHP ProBook 440 G0\r\nHP ProBook 440 G1\r\nHP ProBook 440 G2\r\nHP ProBook 450 G0\r\nHP ProBook 450 G1\r\nHP ProBook 450 G2\r\nHP ProBook 640 G1\r\nHP ProBook 645 G1\r\nHP ProBook 650 G1\r\nHP ProBook 655 G1\r\nHP Pro x2 612 G1\r\nHP Spectre x2 13-SMB Pro\r\nHP ZBook 14\r\nHP ZBook 14 G2\r\nHP ZBook 15\r\nHP ZBook 15 G2\r\nHP ZBook 15u HP ZBook 17\r\nHP Zbook 17 G2\r\nmt41 Thin Client\r\n\r\nBACKGROUND\r\n\r\nCVSS 2.0 Base Metrics\r\n===========================================================\r\n Reference Base Vector Base Score\r\nCVE-2015-5367 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9\r\nCVE-2015-5368 (AV:N/AC:M/Au:N/C:N/I:P/A:C) 7.8\r\n===========================================================\r\n Information on CVSS is documented\r\n in HP Customer Notice: HPSN-2008-002\r\n\r\nThe Hewlett-Packard Company thanks Mickey Shkatov and Jesse Michael from the\r\nAdvanced Threat Research team at Intel Security for reporting this issue to\r\nsecurity-alert@hp.com.\r\n\r\nRESOLUTION\r\n\r\nHP has provided firmware updates to address the vulnerabilities for HP PCs\r\nwith the HP lt4112 LTE/HSPA+ Gobi 4G Module.\r\n\r\nTo acquire the firmware updates, go to hp.com\r\n\r\nSelect "Support" and then "Download Drivers"\r\nEnter your product name or number in the "Find my product" field.\r\nChoose the product from the returned search\r\nChoose the operating system\r\nUnder the Download Index, select Firmware, and download the 12.500.00.15.1803\r\nfirmware or later (HP Softpaq # SP72435 or later). Follow the installation\r\ninstructions to install the firmware update.\r\n\r\nHISTORY\r\nVersion:1 (rev.1) - 26 August 2015 Initial release\r\nVersion:2 (rev.2) - 10 September 2015 Updated affected products\r\n\r\nThird Party Security Patches: Third party security patches that are to be\r\ninstalled on systems running HP software products should be applied in\r\naccordance with the customer's patch management policy.\r\n\r\nSupport: For issues about implementing the recommendations of this Security\r\nBulletin, contact normal HP Services support channel. For other issues about\r\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com.\r\n\r\nReport: To report a potential security vulnerability with any HP supported\r\nproduct, send Email to: security-alert@hp.com\r\n\r\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\r\nalerts via Email:\r\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\r\n\r\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\r\navailable here:\r\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\r\n\r\nSoftware Product Category: The Software Product Category is represented in\r\nthe title by the two characters following HPSB.\r\n\r\n3C = 3COM\r\n3P = 3rd Party Software\r\nGN = HP General Software\r\nHF = HP Hardware and Firmware\r\nMP = MPE/iX\r\nMU = Multi-Platform Software\r\nNS = NonStop Servers\r\nOV = OpenVMS\r\nPI = Printing and Imaging\r\nPV = ProCurve\r\nST = Storage Software\r\nTU = Tru64 UNIX\r\nUX = HP-UX\r\n\r\nCopyright 2015 Hewlett-Packard Development Company, L.P.\r\nHewlett-Packard Company shall not be liable for technical or editorial errors\r\nor omissions contained herein. The information provided is provided "as is"\r\nwithout warranty of any kind. To the extent permitted by law, neither HP or\r\nits affiliates, subcontractors or suppliers will be liable for\r\nincidental,special or consequential damages including downtime cost; lost\r\nprofits; damages relating to the procurement of substitute products or\r\nservices; or damages for loss of data, or software restoration. The\r\ninformation in this document is subject to change without notice.\r\nHewlett-Packard Company and the names of Hewlett-Packard products referenced\r\nherein are trademarks of Hewlett-Packard Company in the United States and\r\nother countries. Other product and company names mentioned herein may be\r\ntrademarks of their respective owners.\r\n\r\n", "edition": 1, "modified": "2015-09-14T00:00:00", "published": "2015-09-14T00:00:00", "id": "SECURITYVULNS:DOC:32490", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32490", "title": "[security bulletin] HPSBHF03408 rev.2 - HP PCs with HP lt4112 LTE/HSPA+ Gobi 4G Module, Remote Execution of Arbitrary Code", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-5367", "CVE-2015-5368"], "description": "No description provided", "edition": 1, "modified": "2015-09-14T00:00:00", "published": "2015-09-14T00:00:00", "id": "SECURITYVULNS:VULN:14676", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14676", "title": "HP lt4112 4G adapters code execution", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:COMPLETE/"}}]}