HP Network Automation RPCServlet Java Object Deserialization RCE

critical Nessus Plugin ID 95658
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


An application running on the remote host is affected by a remote code execution vulnerability.


The HP Network Automation application running on the remote host is version 9.1x, 9.2x, or 10.00.x prior to 10.00.021; 10.10.x or 10.11.x prior to 10.11.011; or 10.20.x prior to 10.20.001. It is, therefore, affected by a remote code execution vulnerability in RPCServlet due to improper sanitization of user-supplied input before attempting deserialization of Java objects. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary code.


Apply the appropriate patch according to the vendor advisory.

See Also


Plugin Details

Severity: Critical

ID: 95658

File Name: hp_network_automation_hpsbgn03677.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 12/9/2016

Updated: 11/13/2019

Dependencies: hp_network_automation_detect.nbin

Risk Information

CVSS Score Source: CVE-2016-8511


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:F/RL:OF/RC:ND


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:hp:network_automation

Required KB Items: installed_sw/HP Network Automation

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/28/2016

Vulnerability Publication Date: 11/28/2016

Reference Information

CVE: CVE-2016-8511

BID: 94610

HP: HPSBGN03677, emr_na-c05344849