The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-39299

CVE-2021-39299: HP Elite Dragonfly Privilege Escalation

CVE-2021-39299 is a privilege escalation vulnerability in HP Elite Dragonfly UEFI firmware that enables unauthorized privilege elevation and code execution. This article covers technical details, affected versions, and mitigations.

Published: February 25, 2026

CVE-2021-39299 Overview

CVE-2021-39299 is a UEFI firmware (BIOS) vulnerability affecting a wide range of HP PC products. This security flaw enables privilege escalation and arbitrary code execution at the firmware level, representing a significant threat to enterprise environments deploying affected HP hardware. UEFI/BIOS-level vulnerabilities are particularly dangerous as they can persist across operating system reinstallations and are difficult to detect with traditional security tools.

Critical Impact

Successful exploitation allows attackers to escalate privileges and execute arbitrary code at the firmware level, potentially compromising the entire system boot chain and persisting below the operating system.

Affected Products

  • HP Elite Dragonfly, Elite Dragonfly G2, Elite Dragonfly Max
  • HP EliteBook series (830, 836, 840, 846, 850, 1050 across G5-G8 generations)
  • HP EliteBook x360 series (1030, 1040, 830 across G3-G8 generations)
  • HP ProBook series (430, 440, 450, 470, 630, 640, 650 across G4-G8 generations)
  • HP ZBook series (14u, 15, 15u, 17, Create, Firefly, Fury, Power, Studio)
  • HP Z Workstation series (Z1, Z4, Z6, Z8)
  • HP EliteDesk and ProDesk desktop series
  • HP EliteOne and ProOne All-in-One series
  • HP Engage and MP9 Retail Systems

Discovery Timeline

  • February 16, 2022 - CVE-2021-39299 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2021-39299

Vulnerability Analysis

This vulnerability resides within the UEFI firmware (BIOS) of numerous HP PC products. The flaw allows an attacker with local access to escalate privileges and execute arbitrary code within the firmware context. Exploitation requires local access to the system but does not require user interaction, making it suitable for post-compromise persistence scenarios.

The vulnerability affects the pre-boot environment, meaning malicious code can execute before the operating system loads. This provides attackers with the ability to install persistent implants that survive operating system reinstallation, bypass Secure Boot protections, and potentially intercept or modify the boot process. The scope is changed, meaning successful exploitation can affect resources beyond the vulnerable component's security authority.

Root Cause

The vulnerability stems from inadequate security controls within the UEFI firmware implementation. While the specific technical details have not been publicly disclosed by HP, UEFI vulnerabilities of this nature typically arise from insufficient input validation in SMM (System Management Mode) handlers, improper memory protection boundaries, or weaknesses in firmware update verification mechanisms that allow privilege escalation from ring 0 to SMM.

Attack Vector

The attack vector requires local access to the target system. An attacker with low-privilege access to the operating system can exploit this vulnerability to gain elevated privileges within the firmware layer. The attack flow typically involves:

  1. An attacker gains initial access to the target system with standard user privileges
  2. The attacker identifies a vulnerable HP system running affected UEFI firmware
  3. Exploitation of the vulnerability escalates privileges to the firmware/SMM level
  4. The attacker can then install persistent implants, modify boot components, or extract sensitive data stored in firmware

No verified proof-of-concept code is publicly available for this vulnerability. Organizations should refer to HP's Security Document for detailed technical information and affected firmware versions.

Detection Methods for CVE-2021-39299

Indicators of Compromise

  • Unexpected modifications to UEFI firmware or BIOS configuration settings
  • Changes to Secure Boot policies or certificate databases without authorized administrative action
  • Anomalous SMM-related events in system firmware logs
  • Presence of unknown or unsigned firmware modules during boot integrity checks

Detection Strategies

  • Deploy firmware integrity monitoring solutions that validate BIOS/UEFI images against known-good baselines
  • Enable and monitor TPM-based measured boot to detect unauthorized firmware modifications
  • Implement SentinelOne's firmware protection capabilities to detect pre-boot threats
  • Conduct regular firmware version audits to identify systems running vulnerable BIOS versions

Monitoring Recommendations

  • Configure centralized logging for firmware update events and BIOS configuration changes
  • Monitor for attempts to access SMM-related resources or trigger SMI (System Management Interrupt) handlers
  • Implement hardware inventory management to track firmware versions across the enterprise
  • Establish alerting for any systems failing Secure Boot attestation

How to Mitigate CVE-2021-39299

Immediate Actions Required

  • Identify all HP systems in your environment that are affected by this vulnerability using the comprehensive product list in HP's advisory
  • Prioritize patching for systems containing sensitive data or operating in high-security environments
  • Enable Secure Boot and configure BIOS passwords to prevent unauthorized firmware modifications
  • Apply firmware updates during scheduled maintenance windows with proper change management procedures

Patch Information

HP has released updated UEFI firmware to address this vulnerability. Administrators should consult HP's Security Document to obtain the specific firmware versions that remediate this vulnerability for each affected product. Firmware updates should be applied using HP's official tools such as HP Image Assistant (HPIA) or HP Client Management Script Library (CMSL) for enterprise deployments.

Workarounds

  • Enable BIOS administrator passwords to prevent unauthorized firmware modifications
  • Configure Secure Boot with custom keys to establish stronger boot chain verification
  • Restrict physical access to affected systems where possible
  • Implement network segmentation to limit lateral movement if a system is compromised
  • Consider disabling unused firmware features (e.g., PXE boot, USB boot) in BIOS settings to reduce attack surface
bash
# Example: Using HP Image Assistant (HPIA) for firmware deployment
# Download HPIA from HP support and run with appropriate parameters
HPImageAssistant.exe /Operation:Analyze /Category:BIOS /Selection:All /Action:List /ReportFolder:C:\HPIA_Reports
# Review report for firmware updates, then apply:
HPImageAssistant.exe /Operation:Analyze /Category:BIOS /Selection:All /Action:Install /Silent

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechHp

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Vendor Resources
  • HP Security Document
  • Related CVEs
  • CVE-2021-39298: HP Z1 Entry Tower G5 Privilege Escalation

  • CVE-2024-5477: HP System BIOS Privilege Escalation Flaw

  • CVE-2022-37018: HP Z1 G3 BIOS Privilege Escalation Flaw

  • CVE-2023-5410: HP PC BIOS Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English