HP SAN/iQ <= 10.0 Root Shell Command Injection

Critical Nessus Plugin ID 61612


A management service on the remote host has a command injection vulnerability.


The version of SAN/iQ running on the remote host has a command injection vulnerability. The hydra service, used for remote management and configuration, does not properly sanitize untrusted input. A remote attacker could exploit this to execute arbitrary commands as root. Authentication is required, but can be bypassed easily by using default, hard-coded credentials.


There is no known solution at this time.

See Also


Plugin Details

Severity: Critical

ID: 61612

File Name: hp_saniq_hydra_cmd_injection2.nasl

Version: $Revision: 1.13 $

Type: remote

Published: 2012/08/21

Modified: 2016/11/18

Dependencies: 73460

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:hp:san/iq

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2012/08/17

Exploitable With

Metasploit (HP StorageWorks P4000 Virtual SAN Appliance Command Execution)

Reference Information

CVE: CVE-2012-2986

BID: 55133

OSVDB: 82087

TRA: TRA-2011-12

CERT: 441363