HP Data Protector 8.x Arbitrary Command Execution (HPSBMU03072)

critical Nessus Plugin ID 76616

Synopsis

The remote host is affected by an arbitrary command execution vulnerability.

Description

Nessus was able to execute an operating system command on the remote HP Data Protector 8.x installation by sending a specially crafted packet to the HP Data Protector service.

Solution

A patched version is not currently available. As a workaround, enable Encrypted Control Communications (ECC) services on the cell server and all of the clients in cell.

See Also

http://www.nessus.org/u?0429b1fa

Plugin Details

Severity: Critical

ID: 76616

File Name: hp_data_protector_hpsbmu03072.nbin

Version: 1.80

Type: remote

Family: Misc.

Published: 7/21/2014

Updated: 3/19/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:hp:storage_data_protector, cpe:/a:hp:data_protector

Required KB Items: Services/data_protector/version

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/15/2014

Exploitable With

Core Impact

Metasploit (HP Data Protector 8.10 Remote Command Execution)

ExploitHub (EH-14-163)

Reference Information

CVE: CVE-2014-2623

BID: 68533, 68672

HP: HPSBMU03072, SSRT101644, emr_na-c04373818-1