Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
HPE fixes maximum severity remote auth bypass bug in SSMC console
#1
https://www.bleepingcomputer.com/news/se...c-console/        HPE fixes maximum severity remote auth bypass bug in SSMC console
By Sergiu Gatlan
October 23, 2020 06:22 PM    Hewlett Packard Enterprise (HPE) has fixed a maximum severity remote authentication bypass vulnerability affecting the company's HPE StoreServ Management Console (SSMC) data center storage management solution.

HPE SSMC is a management and reporting console for HPE Primera (data storage for mission-critical apps) and HPE 3PAR StoreServ systems (AI-powered storage cloud service providers) data center arrays.

SSMC "is an off node multiarray manager web application and remains isolated from data on the managed arrays" according to HPE's advisory.

10/10 severity rating
The patched remote authentication bypass vulnerability is tracked as CVE-2020-7197 and it affects HPE 3PAR StoreServ Management and Core Software Media prior to 3.7.0.0.

CVE-2020-7197 was rated by HPE as a maximum severity (10/10) vulnerability that allows threat actors with no privileges to exploit it as part of low complexity attacks that don't require user interaction.

To mitigate the flaw, HPE recommends upgrading the HPE 3PAR StoreServ Management Console (SSMC) to 3.7.1.1 or later.

SSMC 3.7.1.1 can be downloaded for free from the HPE Mylicense portal by all costumers with an HPE Passport Account. "This SSMC release includes important security and quality improvement defect fixes that strengthen the security posture of SSMC appliances," the changelog reads.

"HPE strongly recommends that you upgrade your SSMC appliance to this version."

The critical SSMC vulnerability was found and reported by MindPoint Group penetration tester Elwood Buck according to HPE's security advisory.

HPE did not provide any other details on the security flaw's inner-workings or information regarding in the wild attacks exploiting the bug.

65 critical RCE bugs also fixed in HPE iMC
Earlier this month, HPE also patched 64 security vulnerabilities affecting HPE Intelligent Management Center (iMC) prior to 7.3 (E0705P07).

The list of issues reported by information security specialist Steven Seeley of Qihoo 360 Vulcan Team includes 62 remote code execution bugs, one auth bypass, and a privilege escalation bug with severity ratings between 8.8 and 9.8.

Users can fully mitigate the vulnerabilities by upgrading HPE Intelligent Management Center (iMC) to version 7.3 (E0705P07).

The security patches are available from both the HPE Support Center and Aruba's Support Portal.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Low-Detection Phishing Kits Increasingly Bypass MFA Mohammad.Poorya 0 1,099 02-04-2022 , 05:29 PM
Last Post: Mohammad.Poorya
  F5 urges customers to patch 4 critical BIG-IP pre-auth RCE bugs Bjyda 0 1,077 03-11-2021 , 10:48 PM
Last Post: Bjyda
  NVIDIA fixes high severity flaws affecting Windows, Linux devices tarekma7 0 1,062 01-09-2021 , 05:28 PM
Last Post: tarekma7
  Cisco fixes critical pre-auth flaws allowing router takeover tarekma7 0 1,535 07-17-2020 , 10:19 PM
Last Post: tarekma7
  Microsoft Edge 84.0.522.40 Severity Fix mrtrout 0 1,637 07-16-2020 , 08:47 PM
Last Post: mrtrout



Users browsing this thread: 2 Guest(s)