HPE Fixes Critical Zero-Day in Server Management Software

The bug in HPE SIM makes it easy as pie for attackers to remotely trigger code, no user interaction necessary.

Hewlett Packard Enterprise (HPE) has fixed a critical zero-day remote code execution (RCE) flaw in its HPE Systems Insight Manager (SIM) software for Windows that it originally disclosed in December.

HPE SIM is a tool that enables remote support automation and management for a variety of HPE servers, including the HPE ProLiant Gen10 and HPE ProLiant Gen9, as well as for storage and networking products.

The company updated its initial security advisory on Thursday. More than a month ago, on April 20, HPE had issued an earlier SIM hotfix update kit that resolves the vulnerability.

This is an extremely high-risk flaw that can enable attackers with no privileges to remotely execute code: Tracked as CVE-2020-7200, it’s rated 9.8 out of a maximum 10. It’s found in the latest versions (7.6.x) of HPE’s SIM software and only affects the Windows version.

This bug allows low-complexity attacks that don’t require user interaction. As Packet Storm has explained, it allows attackers to execute code within the context of HPE SIM’s hpsimsvc.exe process, which runs with administrative privileges.

The problem stems from a failure to validate data during the deserialization process when a user submits a POST request to the /simsearch/messagebroker/amfsecure page. “This module exploits this vulnerability by leveraging an outdated copy of Commons Collection, namely 3.2.2, that ships with HPE SIM, to gain remote code execution as the administrative user running HPE SIM,” according to Packet Storm. The lack of proper validation of user-supplied data can lead to the deserialization of untrusted data, enabling attackers to execute code on servers running vulnerable SIM software.

There’s a Workaround

HPE recommends hopping to it as soon as possible when it comes to deploying this patch. For those who can’t immediately deploy the CVE-2020-7200 security update on vulnerable systems, HPE has provided mitigation measures that involve removing the “Federated Search” & “Federated CMS Configuration” feature that allowed the vulnerability.

The workaround for existing system prior to the Hotfix Update Kit issued on April 20:

  1. Stop HPE SIM Service
  2. Delete <C:\Program Files\HP\Systems Insight Manager\jboss\server\hpsim\deploy\simsearch.war> file from sim installed path del /Q /F C:\Program Files\HP\Systems Insight Manager\jboss\server\hpsim\deploy\simsearch.war
  3. Restart the HPE SIM Service
  4. Wait for HPE SIM web page “https://SIM_IP:50000” to be accessible and execute the following command from command prompt: mxtool -r -f tools\multi-cms-search.xml 1>nul 2>nul

HPE SIM users will no longer be able to use the federated search feature after using the workaround.

Download our exclusive FREE Threatpost Insider eBook, 2021: The Evolution of Ransomware,” to help hone your cyber-defense strategies against this growing scourge. We go beyond the status quo to uncover what’s next for ransomware and the related emerging risks. Get the whole story and DOWNLOAD the eBook now – on us!

Suggested articles

Cyberpunk 2077 Hacked Data Circulating Online

CD Projekt Red confirmed that employee and game-related data appears to be floating around the cyber-underground, four months after a hack on the Witcher and Cyberpunk 2077 developer.

Discussion

Leave A Comment

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.