H3C / HPE Intelligent Management Center PLAT < 7.3 E0504P04 Multiple Vulnerabilities - Nessus

Critical   Plugin ID: 100868

This page contains detailed information about the H3C / HPE Intelligent Management Center PLAT < 7.3 E0504P04 Multiple Vulnerabilities Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.

Plugin Overview


ID: 100868
Name: H3C / HPE Intelligent Management Center PLAT < 7.3 E0504P04 Multiple Vulnerabilities
Filename: hp_imc_73_e0504p04.nasl
Vulnerability Published: 2016-11-10
This Plugin Published: 2017-06-19
Last Modification Time: 2022-04-11
Plugin Version: 1.15
Plugin Type: remote
Plugin Family: Misc.
Dependencies: hp_imc_detect.nbin

Vulnerability Information


Severity: Critical
Vulnerability Published: 2016-11-10
Patch Published: 2017-05-09
CVE [?]: CVE-2016-7053, CVE-2016-7054, CVE-2016-7055, CVE-2017-5815, CVE-2017-5816, CVE-2017-5817, CVE-2017-5818, CVE-2017-5819, CVE-2017-5820, CVE-2017-5821, CVE-2017-5822, CVE-2017-5823, CVE-2017-8948, CVE-2017-8956
CPE [?]: cpe:/a:hp:intelligent_management_center

Synopsis

An application installed on the remote Windows host is affected by multiple vulnerabilities.

Description

The version of HPE Intelligent Management Center (iMC) PLAT installed on the remote host is prior to 7.3 E0504P04. It is, therefore, affected by multiple vulnerabilities :

- A NULL pointer deference flaw exists, specifically in the asn1_item_embed_d2i() function within file crypto/asn1/tasn_dec.c, when handling the ASN.1 CHOICE type, which results in a NULL value being passed to the structure callback if an attempt is made to free certain invalid encodings. An unauthenticated, remote attacker can exploit this to cause a denial of service condition. (CVE-2016-7053)

- A heap overflow condition exists in the chacha20_poly1305_cipher() function within file crypto/evp/e_chacha20_poly1305.c when handling TLS connections using *-CHACHA20-POLY1305 cipher suites. An unauthenticated, remote attacker can exploit this to cause a denial of service condition. (CVE-2016-7054)

- A carry propagation error exists in the Broadwell-specific Montgomery multiplication procedure when handling input lengths divisible by but longer than 256 bits. This can result in transient authentication and key negotiation failures or reproducible erroneous outcomes of public-key operations with specially crafted input. A man-in-the-middle attacker can possibly exploit this issue to compromise ECDH key negotiations that utilize Brainpool P-512 curves. (CVE-2016-7055)

- An unspecified flaw exists that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-5815)

- A command injection vulnerability exists in the dbman service due to improper validation of user-supplied input before it is passed to a system call. An unauthenticated, remote attacker can exploit this, via a specially crafted opcode 10008 request, to inject and execute arbitrary OS commands with SYSTEM privileges. (CVE-2017-5816)

- Multiple command injection vulnerabilities exist in the dbman service due to improper validation of user-supplied input before it is passed to a system call. An unauthenticated, remote attacker can exploit these, via a specially crafted opcode 10007 request, to inject and execute arbitrary OS commands with SYSTEM privileges. (CVE-2017-5817, CVE-2017-5819)

- A flaw exists in the dbman service when handling opcode 10007 requests due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to delete arbitrary files with SYSTEM privileges. (CVE-2017-5818)

- A flaw exists in the dbman service when handling opcode 10004 requests due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary code. (CVE-2017-5820)

- A flaw exists in the dbman service when handling opcode 10006 and 10010 requests due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially request, to execute arbitrary code. (CVE-2017-5821)

- A flaw exists in the dbman service when handling opcode 10010 requests due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary code. (CVE-2017-5822)

- A flaw exists in the dbman service when handling opcode 10013 requests due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary code. (CVE-2017-5823)

- An unspecified remote code execution vulnerability exists that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-8948)

- A stack-based buffer overflow condition exists due to improper validation of input when copying data. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-8956)

Note that Intelligent Management Center (iMC) is an HPE product; however, it is branded as H3C.

Solution

Upgrade to H3C / HPE iMC version 7.3 E0504P04 or later.

Public Exploits


Target Network Port(s): 61616
Target Asset(s): Services/activemq
Exploit Available: True (Metasploit Framework, Exploit-DB, GitHub, Immunity Canvas, Core Impact)
Exploit Ease: Exploits are available

Here's the list of publicly known exploits and PoCs for verifying the H3C / HPE Intelligent Management Center PLAT < 7.3 E0504P04 Multiple Vulnerabilities vulnerability:

  1. Metasploit: exploit/windows/misc/hp_imc_dbman_restoredbase_unauth_rce
    [HPE iMC dbman RestoreDBase Unauthenticated RCE]
  2. Metasploit: exploit/windows/misc/hp_imc_dbman_restartdb_unauth_rce
    [HPE iMC dbman RestartDB Unauthenticated RCE]
  3. Exploit-DB: exploits/linux/dos/40899.py
    [EDB-40899: OpenSSL 1.1.0a/1.1.0b - Denial of Service]
  4. Exploit-DB: exploits/windows/remote/43492.rb
    [EDB-43492: HPE iMC - dbman 'RestoreDBase' Remote Command Execution (Metasploit)]
  5. Exploit-DB: exploits/windows/remote/43493.rb
    [EDB-43493: HPE iMC - dbman 'RestartDB' Remote Command Execution (Metasploit)]
  6. Exploit-DB: exploits/linux/remote/44073.md
    [EDB-44073: HPE Intelligent Management Center (iMC) 7.2 (E0403P10) - Code Execution]
  7. Exploit-DB: exploits/windows/remote/43195.py
    [EDB-43195: HP iMC Plat 7.2 - Remote Code Execution]
  8. Exploit-DB: exploits/windows/remote/43198.py
    [EDB-43198: HP iMC Plat 7.2 - Remote Code Execution (2)]
  9. GitHub: https://github.com/google/honggfuzz
    [CVE-2016-7054]
  10. GitHub: https://github.com/r3p3r/nixawk-honggfuzz
    [CVE-2016-7054]
  11. GitHub: https://github.com/oxagast/oxasploits
    [CVE-2017-5816]
  12. Immunity Canvas: CANVAS

Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.

WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.

Risk Information


CVSS V2 Vector [?]: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
CVSS Base Score:10.0 (High)
Impact Subscore:10.0
Exploitability Subscore:10.0
CVSS Temporal Score:8.3 (High)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:8.3 (High)
CVSS V3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
CVSS Base Score:9.8 (Critical)
Impact Subscore:5.9
Exploitability Subscore:3.9
CVSS Temporal Score:9.1 (Critical)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:9.1 (Critical)
STIG Severity [?]: I
STIG Risk Rating: High

Go back to menu.

Plugin Source


This is the hp_imc_73_e0504p04.nasl nessus plugin source code. This script is Copyright (C) 2017-2022 Tenable Network Security, Inc.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(100868);
  script_version("1.15");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id(
    "CVE-2016-7053",
    "CVE-2016-7054",
    "CVE-2016-7055",
    "CVE-2017-5815",
    "CVE-2017-5816",
    "CVE-2017-5817",
    "CVE-2017-5818",
    "CVE-2017-5819",
    "CVE-2017-5820",
    "CVE-2017-5821",
    "CVE-2017-5822",
    "CVE-2017-5823",
    "CVE-2017-8948",
    "CVE-2017-8956"
  );
  script_bugtraq_id(
    94238,
    94242,
    94244,
    98469,
    98493
  );
  script_xref(name:"HP", value:"emr_na-hpesbhf03743en_us");
  script_xref(name:"HP", value:"emr_na-hpesbhf03744en_us");
  script_xref(name:"HP", value:"emr_na-hpesbhf03745en_us");
  script_xref(name:"HP", value:"emr_na-hpesbhf03746en_us");
  script_xref(name:"HP", value:"HPESBHF03743");
  script_xref(name:"HP", value:"HPESBHF03744");
  script_xref(name:"HP", value:"HPESBHF03745");
  script_xref(name:"HP", value:"HPESBHF03746");
  script_xref(name:"IAVA", value:"2017-A-0193");

  script_name(english:"H3C / HPE Intelligent Management Center PLAT < 7.3 E0504P04 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"An application installed on the remote Windows host is affected by
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of HPE Intelligent Management Center (iMC) PLAT installed
on the remote host is prior to 7.3 E0504P04. It is, therefore,
affected by multiple vulnerabilities :

  - A NULL pointer deference flaw exists, specifically in
    the asn1_item_embed_d2i() function within file
    crypto/asn1/tasn_dec.c, when handling the ASN.1 CHOICE
    type, which results in a NULL value being passed to the
    structure callback if an attempt is made to free certain
    invalid encodings. An unauthenticated, remote attacker
    can exploit this to cause a denial of service condition.
    (CVE-2016-7053)

  - A heap overflow condition exists in the
    chacha20_poly1305_cipher() function within file
    crypto/evp/e_chacha20_poly1305.c when handling TLS
    connections using *-CHACHA20-POLY1305 cipher suites. An
    unauthenticated, remote attacker can exploit this to
    cause a denial of service condition. (CVE-2016-7054)

  - A carry propagation error exists in the
    Broadwell-specific Montgomery multiplication procedure
    when handling input lengths divisible by but longer than
    256 bits. This can result in transient authentication
    and key negotiation failures or reproducible erroneous
    outcomes of public-key operations with specially crafted
    input. A man-in-the-middle attacker can possibly exploit
    this issue to compromise ECDH key negotiations that
    utilize Brainpool P-512 curves. (CVE-2016-7055)

  - An unspecified flaw exists that allows an
    unauthenticated, remote attacker to execute arbitrary
    code. (CVE-2017-5815)

  - A command injection vulnerability exists in the dbman
    service due to improper validation of user-supplied
    input before it is passed to a system call. An
    unauthenticated, remote attacker can exploit this, via a
    specially crafted opcode 10008 request, to inject and
    execute arbitrary OS commands with SYSTEM privileges.
    (CVE-2017-5816)

  - Multiple command injection vulnerabilities exist in the
    dbman service due to improper validation of
    user-supplied input before it is passed to a system
    call. An unauthenticated, remote attacker can exploit
    these, via a specially crafted opcode 10007 request, to
    inject and execute arbitrary OS commands with SYSTEM
    privileges. (CVE-2017-5817, CVE-2017-5819)

  - A flaw exists in the dbman service when handling opcode
    10007 requests due to improper validation of
    user-supplied input. An unauthenticated, remote attacker
    can exploit this, via a specially crafted request, to
    delete arbitrary files with SYSTEM privileges.
    (CVE-2017-5818)

  - A flaw exists in the dbman service when handling opcode
    10004 requests due to improper validation of
    user-supplied input. An unauthenticated, remote attacker
    can exploit this, via a specially crafted request, to
    execute arbitrary code. (CVE-2017-5820)

  - A flaw exists in the dbman service when handling opcode
    10006 and 10010 requests due to improper validation of
    user-supplied input. An unauthenticated, remote attacker
    can exploit this, via a specially request, to execute
    arbitrary code. (CVE-2017-5821)

  - A flaw exists in the dbman service when handling opcode
    10010 requests due to improper validation of
    user-supplied input. An unauthenticated, remote attacker
    can exploit this, via a specially crafted request, to
    execute arbitrary code. (CVE-2017-5822)

  - A flaw exists in the dbman service when handling opcode
    10013 requests due to improper validation of
    user-supplied input. An unauthenticated, remote attacker
    can exploit this, via a specially crafted request, to
    execute arbitrary code. (CVE-2017-5823)

  - An unspecified remote code execution vulnerability
    exists that allows an unauthenticated, remote attacker
    to execute arbitrary code. (CVE-2017-8948)

  - A stack-based buffer overflow condition exists due to
    improper validation of input when copying data. An
    unauthenticated, remote attacker can exploit this to
    cause a denial of service condition or the execution of
    arbitrary code. (CVE-2017-8956)

Note that Intelligent Management Center (iMC) is an HPE product;
however, it is branded as H3C.");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03743en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a7b8f2f9");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03744en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8d91a76d");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1f3805b9");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03746en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f11837c8");
  script_set_attribute(attribute:"solution", value:
"Upgrade to H3C / HPE iMC version 7.3 E0504P04 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'HPE iMC dbman RestoreDBase Unauthenticated RCE');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
  script_set_attribute(attribute:"canvas_package", value:"CANVAS");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/11/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/05/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/06/19");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:intelligent_management_center");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2017-2022 Tenable Network Security, Inc.");

  script_dependencies("hp_imc_detect.nbin");
  script_require_ports("Services/activemq", 61616);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

# Figure out which port to use
port = get_service(svc:'activemq', default:61616, exit_on_fail:TRUE);
version = get_kb_item_or_exit('hp/hp_imc/'+port+'/version');

app = 'HP Intelligent Management Center';

fixed_display = '7.3-E0504P04';

fix = NULL;
patchfix = NULL;

if (version =~ "^[0-6](\.[0-9]+)*$" || # e.g. 5, 6.999
    version =~ "^7\.0([0-9]|\.[0-9]+)*$" || # e.g. 7.01, 7.0.2
    version =~ "^7(\.[0-2])?$" # e.g. 7, 7.1, 7.2
)
{
  fix = "7.3";
}

# check patch version if 7.3
else if (version =~ "^7.3\-")
{
  # Versions < 7.3 E0504P04, remove letters and dashes in version
  patch = pregmatch(pattern:"[0-9.]+-E([0-9A-Z]+)", string:version);
  if (!patch) audit(AUDIT_UNKNOWN_APP_VER, app);
  patchver = ereg_replace(string:patch[1], pattern:"[A-Z\-]", replace:".");
  if (!patchver) audit(AUDIT_UNKNOWN_APP_VER, app);

  patchfix = "0504.04";
}

# if pre 7.3 or 7.3 with patchver before 050404
if ((!isnull(fix) && ver_compare(ver:version, fix:fix, strict:FALSE) < 0) ||
    (!isnull(patchfix) && ver_compare(ver:patchver, fix:patchfix, strict:FALSE) < 0))
{
  items = make_array(
    "Installed version", version,
    "Fixed version", fixed_display
  );

  order = make_list("Installed version", "Fixed version");
  report = report_items_str(report_items:items, ordered_fields:order);

  security_report_v4(port:port, extra:report, severity:SECURITY_HOLE);
  exit(0);

}
else
  audit(AUDIT_INST_VER_NOT_VULN, app, version);

The latest version of this script can be found in these locations depending on your platform:

  • Linux / Unix:
    /opt/nessus/lib/nessus/plugins/hp_imc_73_e0504p04.nasl
  • Windows:
    C:\ProgramData\Tenable\Nessus\nessus\plugins\hp_imc_73_e0504p04.nasl
  • Mac OS X:
    /Library/Nessus/run/lib/nessus/plugins/hp_imc_73_e0504p04.nasl

Go back to menu.

How to Run


Here is how to run the H3C / HPE Intelligent Management Center PLAT < 7.3 E0504P04 Multiple Vulnerabilities as a standalone plugin via the Nessus web user interface (https://localhost:8834/):

  1. Click to start a New Scan.
  2. Select Advanced Scan.
  3. Navigate to the Plugins tab.
  4. On the top right corner click to Disable All plugins.
  5. On the left side table select Misc. plugin family.
  6. On the right side table select H3C / HPE Intelligent Management Center PLAT < 7.3 E0504P04 Multiple Vulnerabilities plugin ID 100868.
  7. Specify the target on the Settings tab and click to Save the scan.
  8. Run the scan.

Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.

Basic usage:

/opt/nessus/bin/nasl hp_imc_73_e0504p04.nasl -t <IP/HOST>

Run the plugin with audit trail message on the console:

/opt/nessus/bin/nasl -a hp_imc_73_e0504p04.nasl -t <IP/HOST>

Run the plugin with trace script execution written to the console (useful for debugging):

/opt/nessus/bin/nasl -T - hp_imc_73_e0504p04.nasl -t <IP/HOST>

Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):

/opt/nessus/bin/nasl -K /tmp/state hp_imc_73_e0504p04.nasl -t <IP/HOST>

Go back to menu.

References


BID | SecurityFocus Bugtraq ID: IAVA | Information Assurance Vulnerability Alert:
  • 2017-A-0193
Hewlett Packard Security:
  • emr_na-hpesbhf03743en_us, emr_na-hpesbhf03744en_us, emr_na-hpesbhf03745en_us, emr_na-hpesbhf03746en_us, HPESBHF03743, HPESBHF03744, HPESBHF03745, HPESBHF03746
See also: Similar and related Nessus plugins:
  • 94691 - FreeBSD : openssl -- multiple vulnerabilities (50751310-a763-11e6-a881-b499baebfeaf)
  • 96821 - FreeBSD : OpenSSL -- multiple vulnerabilities (d455708a-e3d3-11e6-9940-b499baebfeaf)
  • 97183 - GLSA-201702-07 : OpenSSL: Multiple vulnerabilities
  • 100870 - HPE Intelligent Management Center dbman Opcode 10008 Command Injection
  • 100869 - H3C / HPE Intelligent Management Center PLAT < 7.3 E0504P04 Multiple Vulnerabilities
  • 102699 - Juniper Junos Multiple OpenSSL Vulnerabilities (JSA10775)
  • 99515 - MySQL 5.6.x < 5.6.36 Multiple Vulnerabilities (April 2017 CPU) (July 2017 CPU) (Riddle)
  • 99512 - MySQL 5.6.x < 5.6.36 Multiple Vulnerabilities (April 2017 CPU) (July 2017 CPU) (Riddle)
  • 99516 - MySQL 5.7.x < 5.7.18 Multiple Vulnerabilities (April 2017 CPU) (July 2017 CPU)
  • 99513 - MySQL 5.7.x < 5.7.18 Multiple Vulnerabilities (April 2017 CPU) (July 2017 CPU)
  • 99593 - MySQL Enterprise Monitor 3.1.x < 3.1.7.8023 / 3.2.x < 3.2.7.1204 / 3.3.x < 3.3.3.1199 Multiple Vulnerabilities (April 2017 CPU)
  • 96873 - OpenSSL 1.0.2 < 1.0.2k Multiple Vulnerabilities
  • 94963 - OpenSSL 1.1.0 < 1.1.0c Multiple Vulnerabilities
  • 97276 - openSUSE Security Update : openssl (openSUSE-2017-256)
  • 97292 - openSUSE Security Update : nodejs (openSUSE-2017-284)
  • 99212 - openSUSE Security Update : nodejs4 (openSUSE-2017-442)
  • 106863 - openSUSE Security Update : openssl-steam (openSUSE-2018-168)
  • 124059 - Oracle Access Manager Multiple Vulnerabilities (Jan 2018 CPU)
  • 99930 - Oracle Secure Global Desktop Multiple Vulnerabilities (April 2017 CPU) (SWEET32)
  • 111146 - RHEL 7 : Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 7 (RHSA-2018:2185)
  • 111147 - RHEL 6 : Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 6 (RHSA-2018:2186)
  • 97726 - Tenable SecurityCenter 5.x < 5.4.3 Multiple Vulnerabilities (TNS-2017-04) (httpoxy)
  • 101046 - Tenable SecurityCenter OpenSSL 1.0.2 < 1.0.2k Multiple Vulnerabilities (TNS-2017-04)
  • 97102 - Slackware 14.2 / current : openssl (SSA:2017-041-02)
  • 119992 - SUSE SLES12 Security Update : nodejs6 (SUSE-SU-2017:0431-1)
  • 97129 - SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2017:0441-1)
  • 119996 - SUSE SLES12 Security Update : nodejs4 (SUSE-SU-2017:0855-1)
  • 96927 - Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : openssl vulnerabilities (USN-3181-1)
  • 102698 - ESXi 6.0 < Build 5485776 Multiple Vulnerabilities (VMSA-2017-0015) (remote check)
  • 102500 - H3C / HPE Intelligent Management Center PLAT < 7.3 E0506 Multiple Vulnerabilities
  • 103696 - H3C / HPE Intelligent Management Center PLAT < 7.3 E0506P03 Multiple Vulnerabilities
  • 93079 - H3C / HPE Intelligent Management Center Java Object Deserialization RCE
  • 99728 - H3C / HPE Intelligent Management Center RMI Java Object Deserialization RCE

Version


This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file hp_imc_73_e0504p04.nasl version 1.15. For more plugins, visit the Nessus Plugin Library.

Go back to menu.