Advisory Details

July 9th, 2014

Hewlett-Packard Universal CMDB Default Credentials Remote Code Execution Vulnerability

ZDI-14-230
ZDI-CAN-2104

CVE ID CVE-2014-2617
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Hewlett-Packard
AFFECTED PRODUCTS Universal CMDB
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['13678']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Universal CMDB. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the default configuration of Hewlett-Packard Universal CMDB. The configuration contains hard-coded credentials. An attacker can leverage this vulnerability to upload malicious applications that can then be used to execute code under the context of SYSTEM.

ADDITIONAL DETAILS Hewlett-Packard has issued an update to correct this vulnerability. More details can be found at:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04357076
DISCLOSURE TIMELINE
  • 2014-03-07 - Vulnerability reported to vendor
  • 2014-07-09 - Coordinated public release of advisory
CREDIT Ziad Badawi
BACK TO ADVISORIES