ID

VAR-201307-0043


CVE

CVE-2013-2352


TITLE

HP StoreVirtual Storage Runs on the device LeftHand OS Vulnerabilities that gain management access

Trust: 0.8

sources: JVNDB: JVNDB-2013-003323

DESCRIPTION

LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password. HP StoreVirtual products using LeftHand OS are prone to an unauthorized-access vulnerability. A remote attacker can exploit this issue to gain unauthorized access to the affected device. This may aid in further attacks. HP StoreVirtual Storage is a set of virtual storage devices supported by LeftHand OS of Hewlett-Packard (HP), which provides functions such as updating data centers, reducing SAN costs and eliminating failure points. LeftHand OS (aka SAN iQ) is an operating system used on this device. The vulnerability is caused by remote attacks. Password to gain the root authority of the user. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03825537 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03825537 Version: 2 HPSBST02896 rev.2 - HP StoreVirtual Storage, Remote Unauthorized Access NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2013-07-17 Last Updated: 2013-07-17 Potential Security Impact: Remote unauthorized access Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with the HP StoreVirtual Storage. All HP StoreVirtual Storage systems are equipped with a mechanism that allows HP support to access the underlying operating system if permission and access is provided by the customer. This functionality cannot be disabled today. HP StoreVirtual products are storage appliances that use a custom operating system, LeftHand OS, which is not accessible to the end user. Limited access is available to the user via the HP StoreVirtual Command-Line Interface (CLiQ) however root access is blocked. Root access may be requested by HP Support in some cases to help customers resolve complex support issues. To facilitate these cases, a challenge-response-based one-time password utility is employed by HP Support to gain root access to systems when the customer has granted permission and network access to the system. The one-time password utility protects the root access by preventing repeated access to the system with the same pass phrase. Root access to the LeftHand OS does not provide access to the user data being stored on the system. References: CVE-2013-2352 (SSRT101257) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. This issue effects LeftHand OS (a.k.a. SAN iQ) software versions 10.5 and earlier. HP StoreVirtual device HP P4300 HP P4500 HP P4300 G2 HP P4500 G2 HP P4800 G2 HP P4900 G2 HP P4000 VSA HP StoreVirtual 4130 HP StoreVirtual 4330 HP StoreVirtual 4530 HP StoreVirtual 4630 HP StoreVirtual 4730 HP StoreVirtual VSA LeftHand NSM2060 LeftHand NSM2120 Dell PowerEdge 2950 HP DL320S IBM System x3650 LeftHand NSM2060 G2 LeftHand NSM2120 G2 LeftHand VSA BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2013-2352 (AV:N/AC:L/Au:N/C:N/I:C/A:C) 9.4 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 The Hewlett-Packard Company thanks Joshua Small for reporting this issue to security-alert@hp.com RESOLUTION HP has provided patches to resolve this vulnerability. Please see the table below to determine which patch applies to the StoreVirtual version being used. Installation of patch 25051-00 will fail if 9.5 Patch Set 05 is not present Note: HP Support may still request root access to customer systems in order to resolve certain support issues. Patches and release notes may be downloaded using the 9.5 or later CMC. Go to http://www.hp.com/go/hpsc Select your specific product. If you have a HP P4x00 G2 or HP StoreVirtual 4000 product select 'HP StoreVirtual 4000 Storage'. Select 'Drivers, Software & Firmware' under 'Download Options' in the left menu. Select your specific product. Select your language. Click 'Cross operating system (BIOS, Firmware, Diagnostics, etc.)' Click 'Patch' or scroll down to the Patch table j. In the Description column of the Patch table, click the title of the patch: To download the file, click the 'Download' button. To read the release notes, click the 'Release Notes' tab. HISTORY Version:1 (rev.1) - 9 July 2013 Initial release Version:2 (rev.2) - 17 July 2013 Documented the released patches, added LeftHand NSM2120 Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2013 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iEYEARECAAYFAlHnM80ACgkQ4B86/C0qfVlJvACfYidpkJWgTf29SPsi6ABOpm0y oo0AoNyRilCrIZTF6+a3pOqr4epkrCRX =PHV+ -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2013-2352 // JVNDB: JVNDB-2013-003323 // BID: 61070 // VULHUB: VHN-62354 // PACKETSTORM: 122466 // PACKETSTORM: 122340

AFFECTED PRODUCTS

vendor:hpmodel:san\/iqscope:eqversion:9.0

Trust: 1.6

vendor:hpmodel:san\/iqscope:eqversion:8.5

Trust: 1.6

vendor:hpmodel:san\/iqscope:eqversion:8.1

Trust: 1.6

vendor:hpmodel:san\/iqscope:eqversion:9.5

Trust: 1.6

vendor:hpmodel:san\/iqscope:eqversion:10.0

Trust: 1.6

vendor:hpmodel:san\/iqscope:eqversion:8.0

Trust: 1.6

vendor:hpmodel:san\/iqscope:lteversion:10.5

Trust: 1.0

vendor:ibmmodel:system x3650scope: - version: -

Trust: 0.8

vendor:dellmodel:poweredge 2950scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp dl320sscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp p4000 vsascope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp p4300scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp p4300 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp p4500scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp p4500 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp p4900 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp san/iqscope:lteversion:10.5

Trust: 0.8

vendor:hewlett packardmodel:hp storevirtual 4130scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp storevirtual 4330scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp storevirtual 4530scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp storevirtual 4630scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp storevirtual 4730scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp storevirtual vsascope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:lefthand nsm2060scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:lefthand nsm2060 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:lefthand nsm2120 g2scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:lefthand vsascope: - version: -

Trust: 0.8

vendor:hpmodel:san\/iqscope:eqversion:10.5

Trust: 0.6

vendor:dellmodel:poweredgescope:eqversion:29500

Trust: 0.3

sources: BID: 61070 // JVNDB: JVNDB-2013-003323 // CNNVD: CNNVD-201307-216 // NVD: CVE-2013-2352

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-2352
value: HIGH

Trust: 1.0

NVD: CVE-2013-2352
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201307-216
value: CRITICAL

Trust: 0.6

VULHUB: VHN-62354
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-2352
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-62354
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-62354 // JVNDB: JVNDB-2013-003323 // CNNVD: CNNVD-201307-216 // NVD: CVE-2013-2352

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-62354 // JVNDB: JVNDB-2013-003323 // NVD: CVE-2013-2352

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201307-216

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201307-216

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-003323

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-62354

PATCH

title:HPSBST02896 SSRT101257url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c03825537

Trust: 0.8

sources: JVNDB: JVNDB-2013-003323

EXTERNAL IDS

db:NVDid:CVE-2013-2352

Trust: 3.0

db:JVNDBid:JVNDB-2013-003323

Trust: 0.8

db:CNNVDid:CNNVD-201307-216

Trust: 0.7

db:BIDid:61070

Trust: 0.4

db:PACKETSTORMid:122466

Trust: 0.2

db:PACKETSTORMid:122340

Trust: 0.2

db:VULHUBid:VHN-62354

Trust: 0.1

sources: VULHUB: VHN-62354 // BID: 61070 // JVNDB: JVNDB-2013-003323 // PACKETSTORM: 122466 // PACKETSTORM: 122340 // CNNVD: CNNVD-201307-216 // NVD: CVE-2013-2352

REFERENCES

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03825537

Trust: 1.7

url:http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2352

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2352

Trust: 0.8

url:http://www.hp.com

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2352

Trust: 0.2

url:http://www.hp.com/go/hpsc

Trust: 0.1

sources: VULHUB: VHN-62354 // BID: 61070 // JVNDB: JVNDB-2013-003323 // PACKETSTORM: 122466 // PACKETSTORM: 122340 // CNNVD: CNNVD-201307-216 // NVD: CVE-2013-2352

CREDITS

Joshua Small

Trust: 0.3

sources: BID: 61070

SOURCES

db:VULHUBid:VHN-62354
db:BIDid:61070
db:JVNDBid:JVNDB-2013-003323
db:PACKETSTORMid:122466
db:PACKETSTORMid:122340
db:CNNVDid:CNNVD-201307-216
db:NVDid:CVE-2013-2352

LAST UPDATE DATE

2025-04-11T23:08:41.786000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-62354date:2019-10-09T00:00:00
db:BIDid:61070date:2013-07-09T00:00:00
db:JVNDBid:JVNDB-2013-003323date:2013-07-12T00:00:00
db:CNNVDid:CNNVD-201307-216date:2019-10-17T00:00:00
db:NVDid:CVE-2013-2352date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-62354date:2013-07-10T00:00:00
db:BIDid:61070date:2013-07-09T00:00:00
db:JVNDBid:JVNDB-2013-003323date:2013-07-12T00:00:00
db:PACKETSTORMid:122466date:2013-07-18T18:44:29
db:PACKETSTORMid:122340date:2013-07-10T21:48:37
db:CNNVDid:CNNVD-201307-216date:2013-07-18T00:00:00
db:NVDid:CVE-2013-2352date:2013-07-10T22:55:00.953