Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.2637 HPE ConvergedSystem 700 Solutions Using HPE 3PAR Service Processor, Multiple Vulnerabilities 5 September 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: HPE ConvergedSystem 700 Solutions Publisher: Hewlett-Packard Operating System: Network Appliance Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Access Privileged Data -- Remote/Unauthenticated Cross-site Request Forgery -- Remote with User Interaction Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-7099 CVE-2018-7098 CVE-2018-7097 CVE-2018-7096 CVE-2018-7095 Original Bulletin: https://support.hpe.com/hpsc/doc/public/display?docId=hpesbst03884en_us - --------------------------BEGIN INCLUDED TEXT-------------------- HPESBST03884 rev.1 - HPE ConvergedSystem 700 Solutions Using HPE 3PAR Service Processor, Multiple Vulnerabilities SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesbst03884en_us Version: 1 HPESBST03884 rev.1 - HPE ConvergedSystem 700 Solutions Using HPE 3PAR Service Processor, Multiple Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2018-09-04 Last Updated: 2018-09-04 - ------------------------------------------------------------------------------- Potential Security Impact: Local: Directory Traversal, Disclosure of Privileged Information; Remote: Access Restriction Bypass, Code Execution, Cross-Site Request Forgery (CSRF) Source: Hewlett Packard Enterprise, HPE Product Security Response Team VULNERABILITY SUMMARY The HPE 3PAR Service Processor installed on HPE ConvergedSystem 700 solutions which are on SWFW compatibility matrix prior to August 2018 will have SP version 4.4 MU6 or prior. Several security vulnerabilities have been identified in these 3PAR Service Processor (SP) versions. The vulnerabilities may be locally exploited to allow directory traversal, disclosure of privileged information, and remotely exploited to allow access restriction bypass, code execution, and cross site request forgery. Note: This vulnerability impacts both physical and virtual 3PAR Service Processor. References: o CVE-2018-7095 - access restriction bypass o CVE-2018-7096 - remote code execution o CVE-2018-7097 - cross site request forgery o CVE-2018-7098 - local directory traversal o CVE-2018-7099 - local disclosure of privileged information SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. o HPE 3PAR Service Processors - Prior to SP-4.4.0.GA-110(MU7) o HP ConvergedSystem 700 Virtualization 2.0 VMware Kit - Prior to SWFW Compatibility Matrix August 2018 o HP ConvergedSystem 700x for VMware Solution Kit - Prior to SWFW Compatibility Matrix August 2018 o HP ConvergedSystem 700x v1.1 VMware Kit - Prior to SWFW Compatibility Matrix August 2018 BACKGROUND CVSS Version 3.0 and Version 2.0 Base Metrics Reference V3 Vector V3 Base V2 Vector V2 Base Score Score CVE-2018-7095 CVSS:3.0/AV:N/AC:L/PR:L/ 8.0 (AV:L/AC:L/Au:S/ 6.8 UI:R/S:U/C:H/I:H/A:H C:C/I:C/A:C) CVE-2018-7096 CVSS:3.0/AV:N/AC:L/PR:N/ 7.3 (AV:N/AC:L/Au:N/ 7.5 UI:N/S:U/C:L/I:L/A:L C:P/I:P/A:P) CVE-2018-7097 CVSS:3.0/AV:N/AC:L/PR:N/ 6.3 (AV:N/AC:M/Au:N/ 6.8 UI:R/S:U/C:L/I:L/A:L C:P/I:P/A:P) CVE-2018-7098 CVSS:3.0/AV:L/AC:L/PR:N/ 5.9 (AV:L/AC:L/Au:N/ 4.6 UI:N/S:U/C:L/I:L/A:L C:P/I:P/A:P) CVE-2018-7099 CVSS:3.0/AV:L/AC:L/PR:N/ 8.4 (AV:L/AC:L/Au:N/ 7.2 UI:N/S:U/C:H/I:H/A:H C:C/I:C/A:C) Information on CVSS is documented in HPE Customer Notice: HPSN-2008-002 HPE acknowledges Matthijs Koot of Secura for reporting this issue to security-alert@hpe.com. HPE acknowledges Bjoern Brixner of T Systems International GMBH for reporting these vulnerabilities to HPE. RESOLUTION HPE has evaluated the impact of these vulnerabilities that have been identified in all HPE 3PAR Service Processor versions prior to SP-4.4.0.GA-110(MU7). HPE has supplied the following SP release which mitigate any potential impact of the identified vulnerabilities. o SP-4.4.0.GA-110(MU7) (or subsequent release) - Note: the update requires 3PAR OS upgrade to 3.2.2MU6 (or subsequent). o After updating the SP with SP-4.4.0.GA-110(MU7) (or subsequent release), follow these mandatory configuration steps to be followed to mitigate the local disclosure of privileged information in the HPE 3PAR Service Processor: Each of these 4 accounts (setupusr, spvar, 3parcust, cpmaint) should be managed from the menu to change the default passwords as supplied from initial setup. - Change setupusr, spvar, 3parcust, cpmaint using the below example steps. Step 1: Role required: 3parcust SSH into the SP IP address and enter 3parcust as user and the password for it to login. Step 2: From the SP menu, type =1.14.1 Enter The output is as follows. Known users 1 ==> setupusr 2 ==> spvar 3 ==> 3parcust 4 ==> cpmaint 0 ==> Abort Operation **Step 3**: Please select a user to operate on. For each user account, select that account from the menu and change the password. o For questions, please contact HPE Support. HISTORY Version:1 (rev.1) - 4 September 2018 Initial release - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW4980maOgq3Tt24GAQjbtw//drTDQrZN1dUuJ6agBKSt9q2muRehIHZt JXKZdCgsBwd45JwpJLPl9OBMOMrmnZlV90pC3FvbgqAMkOlqJkACcmeqRkbZJZu+ DmPaZVbIJt87CSPONa5SZ1aoFP7ywBQypIGrjTWWpoQuDnCa5T9HdA33NRZtK9qb 9tEv9df2PrE3VGEtNC7W0KvFSl14r26tb/q8ZPbJDKyTTKlQhMqRy+DYYhWktEm3 ITUd36GIvhn3tBEYa5UIzjecYD1b09h1c1cXamq17YZafa1fowI4R6Pwl/Q7ce1x A4hb1mbrC1o2UrM1Pn7YiLTlz4BMBfcNOnYnjVTSwLtwPj1m8wnBHej4Rl9HPJQj v+JzlmNV9ClApWeL9zydmjwRpNXwp51XupBKk/VxdC6oRRaKRvvMYmyrBeuioCa0 jXJkzYfNqCVrecUrr1T3t0+QnO/IHd10HjkoS5CjLHvisagOwKexmAzjmoYqFidF B2nrOZCLp5vVqLXDtG5SvDSH+xDJg1P4YOrg72QuZ7liJCKxPlpVyAIw/LANF3ou L/e6WP4mj5Bq+QOxUc+Cjp5dU6Ds3LEs8vlgOe5VC2cFarpvlDuoC9cgn5/uZ+FU KToSKQ7QiN4s2ySlea2Ipobs5VV5fNQNHOO1fTopGyscKxg5bVXNqaI2+bOL+mow j29/jCx/PEI= =6om5 -----END PGP SIGNATURE-----