Categories: Software Updates

HPE Fixes Maximum Severity Remote Auth Bypass Bug In SSMC Console

HPE Fixes Maximum Severity Remote Auth Bypass Bug In SSMC Console

Hewlett Packard Enterprise (HPE) has fixed a maximum severity remote authentication bypass vulnerability affecting the company’s HPE StoreServ Management Console (SSMC) data center storage management solution.

HPE SSMC is a management and reporting console for HPE Primera (data storage for mission-critical apps) and HPE 3PAR StoreServ systems (AI-powered storage cloud service providers) data center arrays.

SSMC “is an off node multiarray manager web application and remains isolated from data on the managed arrays” according to HPE’s advisory.

10/10 severity rating

The patched remote authentication bypass vulnerability is tracked as CVE-2020-7197 and it affects HPE 3PAR StoreServ Management and Core Software Media prior to 3.7.0.0.

CVE-2020-7197 was rated by HPE as a maximum severity (10/10) vulnerability that allows threat actors with no privileges to exploit it as part of low complexity attacks that don’t require user interaction.

Also Read: Deemed Consent PDPA: How Do Businesses Comply?

To mitigate the flaw, HPE recommends upgrading the HPE 3PAR StoreServ Management Console (SSMC) to 3.7.1.1 or later.

SSMC 3.7.1.1 can be downloaded for free from the HPE Mylicense portal by all costumers with an HPE Passport Account.

Image: HPE

“This SSMC release includes important security and quality improvement defect fixes that strengthen the security posture of SSMC appliances,” the changelog reads.

“HPE strongly recommends that you upgrade your SSMC appliance to this version.”

The critical SSMC vulnerability was found and reported by MindPoint Group penetration tester Elwood Buck according to HPE’s security advisory.

HPE did not provide any other details on the security flaw’s inner-workings or information regarding in the wild attacks exploiting the bug.

Also Read: 10 Principles On How To Build A Good Governance Model

65 critical RCE bugs also fixed in HPE iMC

Earlier this month, HPE also patched 64 security vulnerabilities affecting HPE Intelligent Management Center (iMC) prior to 7.3 (E0705P07).

The list of issues reported by information security specialist Steven Seeley of Qihoo 360 Vulcan Team includes 62 remote code execution bugs, one auth bypass, and a privilege escalation bug with severity ratings between 8.8 and 9.8.

Users can fully mitigate the vulnerabilities by upgrading HPE Intelligent Management Center (iMC) to version 7.3 (E0705P07).

The security patches are available from both the HPE Support Center and Aruba’s Support Portal.

Privacy Ninja

Recent Posts

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

3 weeks ago

Prioritizing Security Measures When Launching Webpage

Prioritizing Security Measures When Launching a Webpage That Every Organisation in Singapore should take note…

3 weeks ago

The Importance of Regularly Changing Passwords for Enhanced Online Security

Importance of Regularly Changing Passwords for Enhance Online Security that every Organisation in Singapore should…

4 weeks ago

Mitigating Human Errors in Organizations: A Comprehensive Approach to Data Protection and Operational Integrity

Comprehensive Approach to Data Protection and Operational Integrity that every Organsiation in Singapore should know…

4 weeks ago

The Importance of Pre-Launch Testing in IT Systems Implementation

Here's the importance of Pre-Launch Testing in IT Systems Implementation for Organisations in Singapore. The…

1 month ago

Understanding Liability in IT Vendor Relationships

Understanding Liability in IT Vendor Relationships that every Organisation in Singapore should look at. Understanding…

1 month ago