HP StorageWorks P4000 Virtual SAN Appliance Remote Code Execution Vulnerability
28 Nov. 2011
Summary
HP StorageWorks P4000 Virtual SAN Appliance (VSA) provides virtualized SAN infrastructure for a Vmware ESX environment. VSA consolidates server disk drives and external storage into a virtual iSCSI SAN. The appliance includes a management service which listens on numerous TCP and UDP ports.
Vulnerable Systems:
* HP P4000 Virtual SAN/iQ versions prior to 9.5
Remote exploitation of an arbitrary command execution vulnerability in HP.'s StorageWorks P4000 Virtual SAN Appliance (VSA) could allow an attacker to execute arbitrary code with the privileges of the affected service.
The management service implements a protocol command to allow a remote client to ping a remote device from the VSA. Input passed as part of this ping request is not correctly sanitized. This condition may result in an arbitrary command execution. This vulnerability does not require authentication as default account credentials are hard-coded into the management service.
Vendor Status:
HP has released patches and workarounds to address this vulnerability.