HPE Fixes Maximum Severity Remote Auth Bypass Bug In SSMC Console
Hewlett Packard Enterprise (HPE) has fixed a maximum severity remote authentication bypass vulnerability affecting the company’s HPE StoreServ Management Console (SSMC) data center storage management solution.
HPE SSMC is a management and reporting console for HPE Primera (data storage for mission-critical apps) and HPE 3PAR StoreServ systems (AI-powered storage cloud service providers) data center arrays.
SSMC “is an off node multiarray manager web application and remains isolated from data on the managed arrays” according to HPE’s advisory.
10/10 severity rating
The patched remote authentication bypass vulnerability is tracked as CVE-2020-7197 and it affects HPE 3PAR StoreServ Management and Core Software Media prior to 3.7.0.0.
CVE-2020-7197 was rated by HPE as a maximum severity (10/10) vulnerability that allows threat actors with no privileges to exploit it as part of low complexity attacks that don’t require user interaction.
Also Read: Deemed Consent PDPA: How Do Businesses Comply?
To mitigate the flaw, HPE recommends upgrading the HPE 3PAR StoreServ Management Console (SSMC) to 3.7.1.1 or later.
SSMC 3.7.1.1 can be downloaded for free from the HPE Mylicense portal by all costumers with an HPE Passport Account.
“This SSMC release includes important security and quality improvement defect fixes that strengthen the security posture of SSMC appliances,” the changelog reads.
“HPE strongly recommends that you upgrade your SSMC appliance to this version.”
The critical SSMC vulnerability was found and reported by MindPoint Group penetration tester Elwood Buck according to HPE’s security advisory.
HPE did not provide any other details on the security flaw’s inner-workings or information regarding in the wild attacks exploiting the bug.
Also Read: 10 Principles On How To Build A Good Governance Model
65 critical RCE bugs also fixed in HPE iMC
Earlier this month, HPE also patched 64 security vulnerabilities affecting HPE Intelligent Management Center (iMC) prior to 7.3 (E0705P07).
The list of issues reported by information security specialist Steven Seeley of Qihoo 360 Vulcan Team includes 62 remote code execution bugs, one auth bypass, and a privilege escalation bug with severity ratings between 8.8 and 9.8.
Users can fully mitigate the vulnerabilities by upgrading HPE Intelligent Management Center (iMC) to version 7.3 (E0705P07).
The security patches are available from both the HPE Support Center and Aruba’s Support Portal.
0 Comments