Hash: SHA256

             AUSCERT External Security Bulletin Redistribution

         HPE ConvergedSystem 700 Solutions Using HPE 3PAR Service
                    Processor, Multiple Vulnerabilities
                             5 September 2018


        AusCERT Security Bulletin Summary

Product:           HPE ConvergedSystem 700 Solutions
Publisher:         Hewlett-Packard
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote/Unauthenticated      
                   Cross-site Request Forgery      -- Remote with User Interaction
                   Unauthorised Access             -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-7099 CVE-2018-7098 CVE-2018-7097
                   CVE-2018-7096 CVE-2018-7095 

Original Bulletin: 

- --------------------------BEGIN INCLUDED TEXT--------------------

HPESBST03884 rev.1 - HPE ConvergedSystem 700 Solutions Using HPE 3PAR Service
Processor, Multiple Vulnerabilities


Document ID: hpesbst03884en_us

Version: 1

HPESBST03884 rev.1 - HPE ConvergedSystem 700 Solutions Using HPE 3PAR Service
Processor, Multiple Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon
as possible.

Release Date: 2018-09-04

Last Updated: 2018-09-04

- -------------------------------------------------------------------------------

Potential Security Impact: Local: Directory Traversal, Disclosure of Privileged
Information; Remote: Access Restriction Bypass, Code Execution, Cross-Site
Request Forgery (CSRF)

Source: Hewlett Packard Enterprise, HPE Product Security Response Team


The HPE 3PAR Service Processor installed on HPE ConvergedSystem 700 solutions
which are on SWFW compatibility matrix prior to August 2018 will have SP
version 4.4 MU6 or prior. Several security vulnerabilities have been identified
in these 3PAR Service Processor (SP) versions. The vulnerabilities may be
locally exploited to allow directory traversal, disclosure of privileged
information, and remotely exploited to allow access restriction bypass, code
execution, and cross site request forgery.

Note: This vulnerability impacts both physical and virtual 3PAR Service


  o CVE-2018-7095 - access restriction bypass
  o CVE-2018-7096 - remote code execution
  o CVE-2018-7097 - cross site request forgery
  o CVE-2018-7098 - local directory traversal
  o CVE-2018-7099 - local disclosure of privileged information

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  o HPE 3PAR Service Processors - Prior to SP-4.4.0.GA-110(MU7)
  o HP ConvergedSystem 700 Virtualization 2.0 VMware Kit - Prior to SWFW
    Compatibility Matrix August 2018
  o HP ConvergedSystem 700x for VMware Solution Kit - Prior to SWFW
    Compatibility Matrix August 2018
  o HP ConvergedSystem 700x v1.1 VMware Kit - Prior to SWFW Compatibility
    Matrix August 2018


CVSS Version 3.0 and Version 2.0 Base Metrics

  Reference            V3 Vector           V3 Base      V2 Vector      V2 Base
                                            Score                       Score

CVE-2018-7095  CVSS:3.0/AV:N/AC:L/PR:L/    8.0       (AV:L/AC:L/Au:S/  6.8
               UI:R/S:U/C:H/I:H/A:H                  C:C/I:C/A:C)

CVE-2018-7096  CVSS:3.0/AV:N/AC:L/PR:N/    7.3       (AV:N/AC:L/Au:N/  7.5
               UI:N/S:U/C:L/I:L/A:L                  C:P/I:P/A:P)

CVE-2018-7097  CVSS:3.0/AV:N/AC:L/PR:N/    6.3       (AV:N/AC:M/Au:N/  6.8
               UI:R/S:U/C:L/I:L/A:L                  C:P/I:P/A:P)

CVE-2018-7098  CVSS:3.0/AV:L/AC:L/PR:N/    5.9       (AV:L/AC:L/Au:N/  4.6
               UI:N/S:U/C:L/I:L/A:L                  C:P/I:P/A:P)

CVE-2018-7099  CVSS:3.0/AV:L/AC:L/PR:N/    8.4       (AV:L/AC:L/Au:N/  7.2
               UI:N/S:U/C:H/I:H/A:H                  C:C/I:C/A:C)

Information on CVSS is documented in HPE Customer Notice: HPSN-2008-002

HPE acknowledges Matthijs Koot of Secura for reporting this issue to
security-alert@hpe.com. HPE acknowledges Bjoern Brixner of T Systems
International GMBH for reporting these vulnerabilities to HPE.


HPE has evaluated the impact of these vulnerabilities that have been identified
in all HPE 3PAR Service Processor versions prior to SP-4.4.0.GA-110(MU7). HPE
has supplied the following SP release which mitigate any potential impact of
the identified vulnerabilities.

  o SP-4.4.0.GA-110(MU7) (or subsequent release)

      - Note: the update requires 3PAR OS upgrade to 3.2.2MU6 (or subsequent).
  o After updating the SP with SP-4.4.0.GA-110(MU7) (or subsequent release),
    follow these mandatory configuration steps to be followed to mitigate the
    local disclosure of privileged information in the HPE 3PAR Service

    Each of these 4 accounts (setupusr, spvar, 3parcust, cpmaint) should be
    managed from the menu to change the default passwords as supplied from
    initial setup.

      - Change setupusr, spvar, 3parcust, cpmaint using the below example

    Step 1: Role required: 3parcust

    SSH into the SP IP address and enter 3parcust as user and the password for
    it to login.

    Step 2: From the SP menu, type

    =1.14.1 Enter

    The output is as follows.

    Known users
    1 ==> setupusr
    2 ==> spvar
    3 ==> 3parcust
    4 ==> cpmaint
    0 ==> Abort Operation
    **Step 3**: Please select a user to operate on.

    For each user account, select that account from the menu and change the

  o For questions, please contact HPE Support.

Version:1 (rev.1) - 4 September 2018 Initial release

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967