The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-3809

CVE-2021-3809: HP Elite Dragonfly Firmware RCE Vulnerability

CVE-2021-3809 is a remote code execution flaw in HP Elite Dragonfly BIOS firmware that enables attackers to execute arbitrary code. This article covers technical details, affected systems, and firmware updates.

Published: February 25, 2026

CVE-2021-3809 Overview

CVE-2021-3809 is a BIOS/UEFI firmware vulnerability affecting a wide range of HP PC products that could allow arbitrary code execution. The vulnerability exists within the UEFI firmware layer, which operates at a privileged level below the operating system. An attacker with local access and low-level privileges could potentially exploit this flaw to execute arbitrary code, compromising the integrity, confidentiality, and availability of the affected system.

This vulnerability is particularly concerning because firmware-level attacks can persist across operating system reinstallations and may be difficult to detect using traditional security tools. HP has released firmware updates to address this security issue across multiple product lines.

Critical Impact

Successful exploitation enables arbitrary code execution at the firmware level, potentially allowing attackers to establish persistent access, bypass security controls, and compromise system integrity below the operating system layer.

Affected Products

  • HP Elite Dragonfly (Firmware version 01.12.00)
  • HP EliteBook Series (1040 G4, 1050 G1, 725 G4, 735 G5/G6, 745 G4/G5/G6, 755 G4/G5, 820 G4, 828 G4, 830 G5/G6, 836 G5/G6, 840 G4/G5/G6, 840r G4, 846 G5, 848 G4, 850 G4/G5/G6, X360 variants)
  • HP ProBook Series (11 EE G2, 430 G4/G5/G6, 440 G4/G5/G6, 445 G6, 445r G6, 450 G4/G5/G6, 455 G4/G5/G6, 455r G6, 470 G4/G5, 640 G3/G4/G5, 645 G3/G4, 650 G3/G4/G5, 655 G3, X360 variants)
  • HP ZBook Series (14u G4/G5/G6, 15 G4/G5/G6, 15u G4/G5/G6, 17 G4/G5/G6, Studio G4/G5, Studio X360 G5, X2 G4)
  • HP EliteDesk/ProDesk Series (705 G3/G4/G5, 800 G3/G4/G5, 880 G3/G4/G5, 400 G3/G4/G5/G6, 405 G4, 480 G4/G5/G6, 600 G3/G4/G5, 680 G3/G4)
  • HP Z Workstation Series (Z1 All-in-One G3, Z1 Entry Tower G5, Z2 Mini G3/G4/G5, Z2 SFF G4/G5, Z2 Tower G4/G5, Z238 Microtower, Z240 SFF/Tower)
  • HP Retail Systems (Elite Slice G1/G2, Engage Flex Pro, Engage Go, Engage One, MP9 G4)

Discovery Timeline

  • February 1, 2023 - CVE-2021-3809 published to NVD
  • March 27, 2025 - Last updated in NVD database

Technical Details for CVE-2021-3809

Vulnerability Analysis

This vulnerability resides in the BIOS (UEFI Firmware) of numerous HP PC products. The flaw falls under CWE-269 (Improper Privilege Management), indicating that the vulnerability involves inadequate control over privileged operations within the firmware environment.

UEFI firmware operates at Ring -2 privilege level, below even the operating system kernel. Exploitation of this vulnerability requires local access to the system with low-level privileges. Once exploited, an attacker can achieve arbitrary code execution within the firmware context, which provides several concerning capabilities including the ability to modify boot processes, install persistent implants that survive OS reinstallation, and potentially disable security features such as Secure Boot.

The attack does not require user interaction, and the scope remains unchanged from the vulnerable component, meaning the impact is contained to the affected system's confidentiality, integrity, and availability—all of which can be fully compromised.

Root Cause

The root cause stems from improper privilege management within the HP UEFI firmware implementation. The specific technical details of the vulnerability have not been publicly disclosed by HP beyond the classification as enabling arbitrary code execution. The vulnerability likely involves insufficient validation or access controls within firmware system management mode (SMM) handlers or other privileged firmware components that could be abused by a local attacker.

Attack Vector

The attack requires local access to the target system. An attacker with low-privilege access to the operating system could potentially exploit this vulnerability through:

  1. Gaining initial access to the target system through phishing, credential theft, or another attack vector
  2. Escalating access to interact with UEFI firmware interfaces
  3. Exploiting the firmware vulnerability to achieve arbitrary code execution
  4. Installing persistent firmware-level malware or backdoors

The local attack vector and low privilege requirement indicate that the vulnerability can be triggered from within a standard user context, making it accessible to any attacker who has achieved initial system compromise.

Detection Methods for CVE-2021-3809

Indicators of Compromise

  • Unexpected modifications to UEFI firmware or NVRAM variables
  • Anomalous SMM (System Management Mode) activity or unexpected SMI (System Management Interrupt) generation
  • Changes to Secure Boot configuration or disabled security features without administrator action
  • Unexplained boot process modifications or unauthorized boot loader changes

Detection Strategies

  • Implement firmware integrity monitoring using tools that can verify UEFI firmware against known-good baselines
  • Enable and monitor Secure Boot logs for unauthorized modification attempts
  • Deploy endpoint detection and response (EDR) solutions with firmware-level visibility
  • Perform regular firmware version audits to ensure all systems are running patched versions

Monitoring Recommendations

  • Configure hardware security module (HSM) or TPM-based attestation to detect firmware tampering
  • Monitor system event logs for BIOS/UEFI update attempts outside of scheduled maintenance windows
  • Implement asset inventory tracking to identify all HP devices running vulnerable firmware versions
  • Enable HP Sure Start or similar firmware protection technologies where available

How to Mitigate CVE-2021-3809

Immediate Actions Required

  • Inventory all HP PC products in your environment to identify affected systems
  • Prioritize firmware updates for systems with sensitive data or critical business functions
  • Restrict local access to affected systems until firmware updates can be applied
  • Enable BIOS administrator passwords to prevent unauthorized firmware modifications

Patch Information

HP has released firmware updates to mitigate this vulnerability. Organizations should download and apply the appropriate BIOS/UEFI firmware update for each affected product from the HP Support Advisory. The security bulletin HPSBHF03788 provides a comprehensive list of affected products with their corresponding patched firmware versions.

Firmware update versions vary by product model. For example:

  • HP Elite Dragonfly requires firmware version 01.12.00 or later
  • HP EliteBook 1040 G4 requires firmware version 1.41 or later
  • HP ProDesk 600 G5 Desktop Mini PC requires firmware version 02.11.00 or later

Consult the HP advisory for the specific minimum fixed version for your product.

Workarounds

  • Enable Secure Boot to prevent execution of unauthorized firmware components where possible
  • Configure BIOS/UEFI administrator passwords to restrict unauthorized firmware modifications
  • Enable HP Sure Start technology if available on your devices to provide firmware attack detection and recovery
  • Implement physical security controls to limit local access to affected systems until patches can be deployed
bash
# Verify current BIOS version on Windows (run as Administrator)
wmic bios get smbiosbiosversion

# HP provides BIOS update utilities - example command-line update
# Download appropriate firmware from HP Support
# Run the BIOS update utility with silent/unattended switches
HPQFlash.exe /s /f /p:"BIOSPassword"

# Verify Secure Boot status on Windows
Confirm-SecureBootUEFI

# Check HP Sure Start status (on supported models)
Get-WmiObject -Namespace "root\HP\InstrumentedBIOS" -Class HP_BIOSSetting | Where-Object {$_.Name -like "*Sure*"}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechHp

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo

  • CWE-269
  • Vendor Resources
  • HP Support Advisory
  • Related CVEs
  • CVE-2021-3808: HP Elite Dragonfly Firmware RCE Vulnerability

  • CVE-2022-31640: HP Elite Dragonfly Firmware RCE Vulnerability

  • CVE-2021-39298: HP Z1 Entry Tower G5 Privilege Escalation

  • CVE-2026-1578: HP App for Android XSS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English