| Summary | A security vulnerability has been identified in HPE SimpliVity 380 Gen 9, HPE SimpliVity 380 Gen 10, HPE SimpliVity 380 Gen 10 G, HPE SimpliVity 2600 Gen 10, SimpliVity OmniCube, SimpliVity OmniStack for Cisco, SimpliVity OmniStack for Lenovo and SimpliVity OmniStack for Dell nodes. An API is used to execute a command manifest file during upgrade does not correctly prevent directory traversal and so can be used to execute manifest files in arbitrary locations on the node. The API does not require user authentication and is accessible over the management network, resulting in the potential for unauthenticated remote execution of manifest files. For all customers running HPE OmniStack version 3.7.9 and earlier. HPE recommends upgrading the OmniStack software to version 3.7.10 or later, which contains a permanent resolution. Customers and partners who can upgrade to 3.7.10 should upgrade at the earliest convenience. For all customers and partners unable to upgrade their environments to the recommended version 3.7.10, HPE has created a Temporary Workaround https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=mmr_sf-EN_US000061901&withFrame for you to implement. All customer should upgrade to the recommended 3.7.10 or later version at the earliest convenience. |
|---|---|
| Publication Date | Jan. 4, 2020, 3:15 a.m. |
| Registration Date | Jan. 26, 2021, 11:38 a.m. |
| Last Update | Nov. 21, 2024, 1:22 p.m. |
| CVSS3.1 : CRITICAL | |
| スコア | 9.8 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : HIGH | |
| Score | 7.5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_380_gen9_firmware:*:*:*:*:*:*:*:* | 3.6.2 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_380_gen9:-:*:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_380_gen10_g_firmware:*:*:*:*:*:*:*:* | 3.7.8 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_380_gen10_g:-:*:*:*:*:*:*:* | ||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_380_gen10_firmware:*:*:*:*:*:*:*:* | 3.7.1 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_380_gen10:-:*:*:*:*:*:*:* | ||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_2600_gen10_firmware:*:*:*:*:*:*:*:* | 3.7.5 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_2600_gen10:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_omnicube_firmware:*:*:*:*:*:*:*:* | 3.5.2 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_omnicube:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_omnistack_for_dell_firmware:*:*:*:*:*:*:*:* | 3.5.2 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_omnistack_for_dell:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_omnistack_for_cisco_firmware:*:*:*:*:*:*:*:* | 3.5.2 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_omnistack_for_cisco:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:o:hp:simplivity_omnistack_for_lenovo_firmware:*:*:*:*:*:*:*:* | 3.5.2 | 3.7.9 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:hp:simplivity_omnistack_for_lenovo:-:*:*:*:*:*:*:* | ||||
| Title | 複数の HPE SimpliVity 製品におけるパストラバーサルの脆弱性 |
|---|---|
| Summary | 複数の HPE SimpliVity 製品には、パストラバーサルの脆弱性が存在します。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Sept. 30, 2019, midnight |
| Registration Date | Feb. 3, 2020, 4:08 p.m. |
| Last Update | Feb. 3, 2020, 4:08 p.m. |
| ヒューレット・パッカード・エンタープライズ |
| SimpliVity 2600 Gen 10 ファームウェア |
| SimpliVity 380 Gen 10 G ファームウェア |
| SimpliVity 380 Gen 10 ファームウェア |
| SimpliVity 380 Gen 9 ファームウェア |
| SimpliVity OmniCube ファームウェア |
| SimpliVity OmniStack for Cisco ファームウェア |
| SimpliVity OmniStack for Dell ファームウェア |
| SimpliVity OmniStack for Lenovo ファームウェア |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2020年02月03日] 掲載 |
Feb. 3, 2020, 4:08 p.m. |