| Summary | A security vulnerability has been identified in HPE SimpliVity 380 Gen 9, HPE SimpliVity 380 Gen 10, HPE SimpliVity 380 Gen 10 G, HPE SimpliVity 2600 Gen 10, SimpliVity OmniCube, SimpliVity OmniStack for Cisco, SimpliVity OmniStack for Lenovo and SimpliVity OmniStack for Dell nodes. Two now deprecated APIs run as root, accept a file name path, and can be used to create or delete arbitrary files on the nodes. These APIs do not require user authentication and are accessible over the management network, resulting in remote availability and integrity vulnerabilities For all customers running HPE OmniStack version 3.7.9 and earlier. HPE recommends upgrading the OmniStack software to version 3.7.10 or later, which contains a permanent resolution. Customers and partners who can upgrade to 3.7.10 should upgrade at the earliest convenience. For all customers and partners unable to upgrade their environments to the recommended version 3.7.10, HPE has created a Temporary Workaround https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=mmr_sf-EN_US000061675&withFrame for you to implement. All customer should upgrade to the recommended 3.7.10 or later version at the earliest convenience. |
|---|---|
| Publication Date | Jan. 4, 2020, 3:15 a.m. |
| Registration Date | Jan. 26, 2021, 11:38 a.m. |
| Last Update | Nov. 21, 2024, 1:22 p.m. |
| CVSS3.1 : HIGH | |
| スコア | 7.5 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | なし |
| CVSS2.0 : HIGH | |
| Score | 9.4 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:N/I:C/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_380_gen9_firmware:*:*:*:*:*:*:*:* | 3.6.2 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_380_gen9:-:*:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_380_gen10_g_firmware:*:*:*:*:*:*:*:* | 3.7.8 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_380_gen10_g:-:*:*:*:*:*:*:* | ||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_380_gen10_firmware:*:*:*:*:*:*:*:* | 3.7.1 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_380_gen10:-:*:*:*:*:*:*:* | ||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_2600_gen10_firmware:*:*:*:*:*:*:*:* | 3.7.5 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_2600_gen10:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_omnicube_firmware:*:*:*:*:*:*:*:* | 3.0.8 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_omnicube:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_omnistack_for_dell_firmware:*:*:*:*:*:*:*:* | 3.0.8 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_omnistack_for_dell:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_omnistack_for_cisco_firmware:*:*:*:*:*:*:*:* | 3.0.8 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_omnistack_for_cisco:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_omnistack_for_lenovo_firmware:*:*:*:*:*:*:*:* | 3.0.8 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_omnistack_for_lenovo:-:*:*:*:*:*:*:* | ||||
| Title | 複数の HPE SimpliVity 製品における脆弱性 |
|---|---|
| Summary | 複数の HPE SimpliVity 製品には、不特定の脆弱性が存在します。 |
| Possible impacts | 情報を改ざんされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Sept. 30, 2019, midnight |
| Registration Date | Feb. 5, 2020, noon |
| Last Update | Feb. 5, 2020, noon |
| ヒューレット・パッカード・エンタープライズ |
| SimpliVity 2600 Gen 10 ファームウェア |
| SimpliVity 380 Gen 10 G ファームウェア |
| SimpliVity 380 Gen 10 ファームウェア |
| SimpliVity 380 Gen 9 ファームウェア |
| SimpliVity OmniCube ファームウェア |
| SimpliVity OmniStack for Cisco ファームウェア |
| SimpliVity OmniStack for Dell ファームウェア |
| SimpliVity OmniStack for Lenovo ファームウェア |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2020年02月05日] 掲載 |
Feb. 5, 2020, noon |