While partners at this week’s TD SYNNEX conference discuss booming IT market conditions, Erick and Rich discuss how to prepare for the inevitable slowdown to come, along with recent evidence that artificial intelligence isn’t all that intelligent yet.
Erick and Rich discuss the potential merits of buying remote access software from a security vendor, why expressing gratitude to employees and customers is a win-win, and the many, many holidays besides Star Wars Day celebrated this week.
With each issue packed full of powerful news, reviews, analysis, and advice targeting IT channel professionals, ChannelPro-SMB will help you cultivate your SMB customers and run your business more profitably.
A vulnerability has been discovered in certain HP PC BIOS, which could allow for local arbitrary code execution. The BIOS is a firmware which is used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process. Successful exploitation of this vulnerability could allow for local arbitrary code execution with kernel level privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Threat Intelligence
A proof-of-concept writeup was posted to GitHub on May 10, 2022. However, there are no reports of active exploitation of the vulnerability.
System Affected This vulnerability is found in the BIOS of numerous HP systems. For a full list of affected systems and BIOS versions, please click here:
Risk Government:
- Large and medium government entities: High
- Small government entities: High
Businesses:
- Large and medium business entities: High - Small business entities: High
Home Users: Low
Technical Summary
This vulnerability is exploited by taking advantage of System Management Interrupt Handler (SMI Handler)’s functionality to execute code from overwritten memory. The CVEs associated with this vulnerability are: CVE-2021-3808 and CVE-2021-3809.
Recommendations
We recommend the following actions be taken:
Upgrade to the latest version of the BIOS for systems affected.
Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
With each issue packed full of powerful news, reviews, analysis, and advice targeting IT channel professionals, ChannelPro-SMB will help you cultivate your SMB customers and run your business more profitably.