<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1462084720533760&amp;ev=PageView&amp;noscript=1">

CVE-2020-7199: HPE Edge Line Infrastructure Management Software RCE

Virsec Security Research Lab Vulnerability Analysis

The Virsec Security Research Lab provides timely, relevant analysis about recent and notable security vulnerabilities.

1.1        Vulnerability Summary

A security vulnerability has been identified in the HPE Edge Line Infrastructure Manager, also known as HPE Edge Line Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration.

Picture4-1

Watch the video to learn more about this and other important vulnerabilities.

1.2        CVSS Score

The CVSS Base score of this vulnerability is 9.8 Critical. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

1.3        Affected Version

HPE Edge Line Infrastructure Management Software - Prior to 1.21.

1.4        Vulnerability Attribution

This vulnerability is disclosed by Jeremy Brown.

1.5        Risk Impact

The Edge Line Infrastructure Manager (EIM) was created to aggregate the management of Edge Line Compute Devices. It is delivered as a Virtual Machine image (OVA) targeted at running on VMware ESXi, workstation, or player. EIM supports discovery, monitoring, and management of Edgeline Converged Edge Systems.

Some of the key feature of HPE are View system information and monitor thermal and power information for the monitored systems, View system health and power status, access the iLO or ISM interface, and view system configuration information, Monitor the server power consumption, Upload, and update firmware etc. Exploiting this vulnerability can provide the attacker the leverage to install Backdoors on all company infrastructures, change critical configuration that can cause catastrophic damages to the integrity of the company. There are no publicly available exploits.

 

1.6        Virsec Security Platform (VSP) Support:

The Virsec Security Platform (VSP)-Host monitors processes that are spawned which are not part of a set of whitelisted process. Any attempt to execute new command or unknown binary would be denied by VSP-Host’s Process Monitoring capability.

1.7        Reference Links:


Download the full vulnerability report to learn more about this and other important vulnerabilities.