Published:2022/02/09 Last Updated:2022/02/09
JVN#12969207
HPE Agentless Management registers unquoted service paths
Overview
HPE Agentless Management registers some Windows services with unquoted file paths.
Products Affected
- HPE Agentless Management Service for Windows x64 - versions prior to 1.44.0.0
- HPE ProLiant Agentless Management Service for HPE Apollo, ProLiant and Synergy Gen9 servers - versions prior to 10.96.0.0
Description
HP Agentless Management provided by Hewlett Packard Enterprise registers some Windows services with unquoted file paths (CWE-428).
Impact
When a registered Windows service path contains spaces and is unquoted, and a malicious executable is placed on a certain path, the executable may be executed with the privilege of the Windows service.
Solution
Update the software
Update the software to the latest version according to the information provided by the developer.
Vendor Status
Vendor | Link |
Hewlett Packard Enterprise | SECURITY BULLETIN: HPESBGN04233 - HPE Agentless Management Service for Windows, Unquoted Search Path |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Base Score:
8.2
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
CVSS v2
AV:L/AC:L/Au:S/C:C/I:C/A:C
Base Score:
6.8
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Daisuke Ota of PwC Consulting LLC reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2021-29218 |
JVN iPedia |
JVNDB-2022-000011 |