| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.5 | $0-$5k | 0.00 |
Summary
A vulnerability marked as critical has been reported in HP Operations Agent up to 8.60.6. The impacted element is an unknown function. Performing a manipulation results in memory corruption. This vulnerability was named CVE-2012-2020. In addition, an exploit is available. It is suggested to upgrade the affected component.
Details
A vulnerability was found in HP Operations Agent up to 8.60.6. It has been classified as very critical. This affects an unknown code. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Unspecified vulnerability in HP Operations Agent before 11.03.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1326.
The weakness was presented 07/11/2012 by Luigi Auriemma (TippingPoint) with Zero Day Initiative (Website). The advisory is shared at h20000.www2.hp.com. This vulnerability is uniquely identified as CVE-2012-2020 since 04/02/2012. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details are unknown but a public exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/25/2025).
A public exploit has been developed in Ruby. The exploit is shared for download at securityfocus.com. It is declared as highly functional. We expect the 0-day to have been worth approximately $25k-$100k.
Upgrading to version 8.60.007 eliminates this vulnerability. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 12448.
The vulnerability is also documented in the databases at X-Force (76822), Exploit-DB (22305), SecurityFocus (BID 54362†) and Vulnerability Center (SBV-40209†). See VDB-61232 for similar entry. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.hp.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 10.0VulDB Meta Temp Score: 9.5
VulDB Base Score: 10.0
VulDB Temp Score: 9.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Highly functional
Programming Language: 🔍
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Saint ID: exploit_info/hp_operations_agent_opcode_8c
Saint Name: HP Operations Agent Opcode 0x8c vulnerability
MetaSploit ID: hp_operations_agent_coda_8c.rb
MetaSploit Name: HP Operations Agent Opcode coda.exe 0x8c Buffer Overflow
MetaSploit File: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Operations Agent 8.60.007
TippingPoint: 🔍
McAfee IPS: 🔍
McAfee IPS Version: 🔍
PaloAlto IPS: 🔍
Fortigate IPS: 🔍
Timeline
04/02/2012 🔍07/09/2012 🔍
07/09/2012 🔍
07/11/2012 🔍
07/11/2012 🔍
06/26/2013 🔍
03/23/2015 🔍
08/25/2025 🔍
Sources
Vendor: hp.comAdvisory: h20000.www2.hp.com⛔
Researcher: Luigi Auriemma (TippingPoint)
Organization: Zero Day Initiative
Status: Confirmed
CVE: CVE-2012-2020 (🔍)
GCVE (CVE): GCVE-0-2012-2020
GCVE (VulDB): GCVE-100-61233
X-Force: 76822
SecurityFocus: 54362 - HP Operations Agent Multiple Remote Code Execution Vulnerabilities
Vulnerability Center: 40209 - HP Operations Agent Before 11.02 Coda.exe Remote Code Execution Vulnerability, Critical
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 03/23/2015 16:50Updated: 08/25/2025 13:04
Changes: 03/23/2015 16:50 (66), 05/04/2017 08:51 (11), 08/25/2025 13:04 (18)
Complete: 🔍
Cache ID: 216:2D1:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

No comments yet. Languages: en.
Please log in to comment.