HP AdvanceStack 10Base-T Switching Hub J3210a up to A.03.07 Configuration Utility web_access.html privileges management

CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.4 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in HP AdvanceStack 10Base-T Switching Hub J3210a up to A.03.07 and classified as critical. Affected by this vulnerability is an unknown functionality of the file web_access.html of the component Configuration Utility. The manipulation leads to privileges management. This vulnerability is known as CVE-2002-0250. Furthermore, there is an exploit available. It is recommended to apply restrictive firewalling. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Details
A vulnerability, which was classified as critical, was found in HP AdvanceStack 10Base-T Switching Hub J3210a up to A.03.07. Affected is some unknown functionality of the file web_access.html of the component Configuration Utility. The manipulation with an unknown input leads to a privileges management vulnerability. CWE is classifying the issue as CWE-269. The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
Web configuration utility in HP AdvanceStack hubs J3200A through J3210A with firmware version A.03.07 and earlier, allows unauthorized users to bypass authentication via a direct HTTP request to the web_access.html file, which allows the user to change the switch s configuration and modify the administrator password.
The weakness was shared 05/29/2002 as not defined posting (Bugtraq). The advisory is available at marc.theaimsgroup.com. This vulnerability is traded as CVE-2002-0250. The exploitability is told to be easy. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. Technical details and a public exploit are known. This vulnerability is assigned to T1068 by the MITRE ATT&CK project.
The exploit is shared for download at exploit-db.com. It is declared as proof-of-concept. As 0-day the estimated underground price was around $5k-$25k. By approaching the search of inurl:web_access.html it is possible to find vulnerable targets with Google Hacking.
It is possible to mitigate the weakness by firewalling .
The vulnerability is also documented in the databases at X-Force (8124), Exploit-DB (21285), SecurityFocus (BID 4062†) and Vulnerability Center (SBV-5969†). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 6.7
VulDB Base Score: 7.3
VulDB Temp Score: 6.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Privileges managementCWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: FirewallStatus: 🔍
0-Day Time: 🔍
McAfee IPS: 🔍
McAfee IPS Version: 🔍
ISS Proventia IPS: 🔍
Timeline
02/08/2002 🔍02/08/2002 🔍
05/29/2002 🔍
05/29/2002 🔍
11/23/2004 🔍
07/11/2014 🔍
09/25/2024 🔍
Sources
Vendor: hp.comAdvisory: marc.theaimsgroup.com
Status: Not defined
CVE: CVE-2002-0250 (🔍)
GCVE (CVE): GCVE-0-2002-0250
GCVE (VulDB): GCVE-100-18174
X-Force: 8124 - HP AdvanceStack 10Base-T Switching Hub could allow an attacker to bypass authentication
SecurityFocus: 4062 - HP AdvanceStack Switch Authentication Bypass Vulnerability
Vulnerability Center: 5969 - HP AdvanceStack hubs J3200A - J3210A Allow Remote Configuration, Medium
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 07/11/2014 02:01 PMUpdated: 09/25/2024 11:47 PM
Changes: 07/11/2014 02:01 PM (62), 05/26/2019 09:51 AM (3), 09/25/2024 11:47 PM (25)
Complete: 🔍
Cache ID: 18:1B4:40
No comments yet. Languages: en.
Please log in to comment.