HP Integrated Lights-Out 1.81/2.09/2.26 privileges management

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.1 | $0-$5k | 0.00 |
Summary
A vulnerability marked as critical has been reported in HP Integrated Lights-Out 1.81/2.09/2.26. This vulnerability affects unknown code. The manipulation leads to privileges management. This vulnerability is traded as CVE-2014-7876. It is possible to initiate the attack remotely. There is no exploit available. To fix this issue, it is recommended to deploy a patch.
Details
A vulnerability, which was classified as critical, has been found in HP Integrated Lights-Out 1.81/2.09/2.26 (Network Management Software). This issue affects an unknown code. The manipulation with an unknown input leads to a privileges management vulnerability. Using CWE to declare the problem leads to CWE-269. The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. Impacted is confidentiality, integrity, and availability.
The weakness was shared 03/17/2015 as HPSBHF03151 as confirmed advisory (Website). It is possible to read the advisory at h20564.www2.hp.com. The identification of this vulnerability is CVE-2014-7876 since 10/06/2014. The exploitation is known to be difficult. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available. The attack technique deployed by this issue is T1068 according to MITRE ATT&CK.
The commercial vulnerability scanner Qualys is able to test this issue with plugin 13358 (HPE Integrated Lights-Out (iLO) Remote Multiple Security Vulnerabilities (HPSBHF03151)).
Applying a patch is able to eliminate this problem.
The vulnerability is also documented in the databases at X-Force (101769), SecurityFocus (BID 73321†), SecurityTracker (ID 1031972†) and Vulnerability Center (SBV-50313†). The entry VDB-74098 is related to this item. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.hp.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.1VulDB Meta Temp Score: 7.1
VulDB Base Score: 8.1
VulDB Temp Score: 7.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Privileges managementCWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Timeline
10/06/2014 🔍03/17/2015 🔍
03/24/2015 🔍
03/25/2015 🔍
03/25/2015 🔍
03/31/2015 🔍
03/31/2015 🔍
05/27/2015 🔍
04/16/2022 🔍
Sources
Vendor: hp.comAdvisory: HPSBHF03151
Status: Confirmed
CVE: CVE-2014-7876 (🔍)
GCVE (CVE): GCVE-0-2014-7876
GCVE (VulDB): GCVE-100-74099
X-Force: 101769 - HP Integrated Lights-Out code execution
SecurityFocus: 73321 - Multiple HP Products CVE-2014-7876 Unspecified Remote Code Execution Vulnerability
SecurityTracker: 1031972 - HP integrated Lights Out (iLO) Lets Remote Users Deny Service, Execute Arbitrary Code, and Gain Elevated Privleges on the Target System
Vulnerability Center: 50313 - HP Integrated Lights-Out (iLO) and iLO Chassis Management (CM) Remote Code Execution or DoS, Critical
See also: 🔍
Entry
Created: 03/25/2015 09:40Updated: 04/16/2022 06:51
Changes: 03/25/2015 09:40 (68), 07/07/2017 17:06 (2), 04/16/2022 06:51 (2)
Complete: 🔍
Cache ID: 216:E6D:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.