Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

HPE Fixes Maximum Severity Remote Auth Bypass Bug In SSMC Console

HPE Fixes Maximum Severity Remote Auth Bypass Bug In SSMC Console

Hewlett Packard Enterprise (HPE) has fixed a maximum severity remote authentication bypass vulnerability affecting the company’s HPE StoreServ Management Console (SSMC) data center storage management solution.

HPE SSMC is a management and reporting console for HPE Primera (data storage for mission-critical apps) and HPE 3PAR StoreServ systems (AI-powered storage cloud service providers) data center arrays.

SSMC “is an off node multiarray manager web application and remains isolated from data on the managed arrays” according to HPE’s advisory.

10/10 severity rating

The patched remote authentication bypass vulnerability is tracked as CVE-2020-7197 and it affects HPE 3PAR StoreServ Management and Core Software Media prior to 3.7.0.0.

CVE-2020-7197 was rated by HPE as a maximum severity (10/10) vulnerability that allows threat actors with no privileges to exploit it as part of low complexity attacks that don’t require user interaction.

Also Read: Deemed Consent PDPA: How Do Businesses Comply?

To mitigate the flaw, HPE recommends upgrading the HPE 3PAR StoreServ Management Console (SSMC) to 3.7.1.1 or later.

SSMC 3.7.1.1 can be downloaded for free from the HPE Mylicense portal by all costumers with an HPE Passport Account.

Image: HPE

“This SSMC release includes important security and quality improvement defect fixes that strengthen the security posture of SSMC appliances,” the changelog reads.

“HPE strongly recommends that you upgrade your SSMC appliance to this version.”

The critical SSMC vulnerability was found and reported by MindPoint Group penetration tester Elwood Buck according to HPE’s security advisory.

HPE did not provide any other details on the security flaw’s inner-workings or information regarding in the wild attacks exploiting the bug.

Also Read: 10 Principles On How To Build A Good Governance Model

65 critical RCE bugs also fixed in HPE iMC

Earlier this month, HPE also patched 64 security vulnerabilities affecting HPE Intelligent Management Center (iMC) prior to 7.3 (E0705P07).

The list of issues reported by information security specialist Steven Seeley of Qihoo 360 Vulcan Team includes 62 remote code execution bugs, one auth bypass, and a privilege escalation bug with severity ratings between 8.8 and 9.8.

Users can fully mitigate the vulnerabilities by upgrading HPE Intelligent Management Center (iMC) to version 7.3 (E0705P07).

The security patches are available from both the HPE Support Center and Aruba’s Support Portal.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us