CVE-2018-7112

Description

The HPE-provided Windows firmware installer for certain Gen9, Gen8, G7,and G6 HPE servers allows local disclosure of privileged information. This issue was resolved in previously provided firmware updates as follows. The HPE Windows firmware installer was updated in the system ROM updates which also addressed the original Spectre/Meltdown set of vulnerabilities. At that time, the Windows firmware installer was also updated in the versions of HPE Integrated Lights-Out 2, 3, and 4 (iLO 2, 3, and 4) listed in the security bulletin. The updated HPE Windows firmware installer was released in the system ROM and HPE Integrated Lights-Out (iLO) releases documented in earlier HPE Security Bulletins: HPESBHF03805, HPESBHF03835, HPESBHF03831. Windows-based systems that have already been updated to the system ROM or iLO versions described in these security bulletins require no further action.

5.5
CVSS
Severity: Medium
CVSS 3.0 •
CVSS 2.0 •
EPSS 0.17%
Vendor Advisory hpe.com Vendor Advisory hpe.com Vendor Advisory hpe.com Vendor Advisory hpe.com
Affected: Hewlett Packard Enterprise Windows firmware installer for Gen9, Gen8, G7,and G6 HPE servers
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2018-7112?
CVE-2018-7112 has been scored as a medium severity vulnerability.
How to fix CVE-2018-7112?
To fix CVE-2018-7112, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2018-7112 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2018-7112 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2018-7112?
CVE-2018-7112 affects Hewlett Packard Enterprise Windows firmware installer for Gen9, Gen8, G7,and G6 HPE servers.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.