H3C / HPE Intelligent Management Center RMI Java Object Deserialization RCE

Critical Nessus Plugin ID 99728


A web application hosted on the remote web server is affected by a remote code execution vulnerability.


The H3C or HPE Intelligent Management Center (iMC) web server running on the remote host is affected by a remote code execution vulnerability due to unsafe deserialization of Java objects to the Apache Commons BeanUtils library via the euplat RMI registry. An unauthenticated, remote attacker can exploit this, by sending a specially crafted RMI message, to execute arbitrary code on the target host.

Note that Intelligent Management Center (iMC) is an HPE product;
however, it is branded as H3C.


Upgrade to H3C / HPE iMC version 7.3 E0504P02 or later.

See Also





Plugin Details

Severity: Critical

ID: 99728

File Name: hp_imc_cve-2017-5792.nasl

Version: $Revision: 1.2 $

Type: remote

Family: Misc.

Published: 2017/04/28

Modified: 2017/05/02

Dependencies: 22227, 71885

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C


Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:hp:intelligent_management_center

Required KB Items: installed_sw/HP Intelligent Management Center Web Interface

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2017/03/08

Vulnerability Publication Date: 2017/03/08

Exploitable With

Core Impact

Reference Information

CVE: CVE-2017-5792

BID: 96769

OSVDB: 153247

HP: emr_na-hpesbhf03713en_us, HPESBHF03713

ZDI: ZDI-17-162