HP ArcSight Logger < 6.0 P2 Multiple Vulnerabilities

high Nessus Plugin ID 85988


A log collection and management system installed on the remote host is affected by multiple vulnerabilities.


According to its self-reported version number, the version of HP ArcSight Logger installed on the remote host is prior to 6.0 P2. It is, therefore, affected by multiple vulnerabilities :

- An authorization bypass vulnerability exists that allows an authenticated, remote attacker to bypass authorization checks and perform unauthorized actions.

- A security bypass vulnerability exists in the SOAP interface due to a failure to properly log and lockout failed login attempts. A remote attacker can exploit this to perform a brute-force attack. (CVE-2015-6029)

- A file command handling local privilege escalation vulnerability exists due to files owned by the arcsight user being executed with root privileges. A local attacker can exploit this to run commands to gain elevated privileges. (CVE-2015-6030)


Upgrade to HP ArcSight Logger 6.0 P2 or later.

See Also




Plugin Details

Severity: High

ID: 85988

File Name: arcsight_logger_6_0_2.nasl

Version: 1.12

Type: local

Agent: unix

Family: Misc.

Published: 9/17/2015

Updated: 10/25/2021

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2015-6030

Vulnerability Information

CPE: cpe:/a:hp:arcsight_logger

Required KB Items: installed_sw/ArcSight Logger

Exploit Ease: No known exploits are available

Patch Publication Date: 8/5/2015

Vulnerability Publication Date: 8/5/2015

Reference Information

CVE: CVE-2015-2136, CVE-2015-6029, CVE-2015-6030

BID: 77128, 76732

HP: HPSBMU03392, HPSBGN03429, HPSBGN03430, SSRT101904, SSRT101901, SSRT102157, emr_na-c04762372, emr_na-c04872416, emr_na-c04863612

IAVA: 2015-A-0280

CERT: 842252