HP MSA2000 G3 “Backdoor” Vulnerability Discovered
A hardcoded password-related security vulnerability has been discovered which apparently affects every HP MSA2000 G3 modular storage array shipped to date.
Apparently a hidden user exists, that is built into the system and doesn’t show up in the user manager, creating a perfect “backdoor” opportunity for an attacker to gain access to potentially sensitive information stored on the device, as well as systems it is connected to. The hard coded user and password in the HP MSA2000 is set to an embarrassingly simple:
username: admin
password: !admin
Because the password can’t be changed or deleted, it creates another serious enterprise vulnerability. Similar vulnerabilities were recently discovered in Cisco Unified Video Conferencing products, where a linux shadow password file contained three hard-coded usernames and passwords.
“The practice of embedding hardcoded passwords, as demonstrated in this most recent HP storage device example, is not only commonplace, but extremely risky. So too is the practice of attempting to ship systems with “hidden” admin users, but in this age of openness, nothing is hidden, and vendors should know that. Because the passwords are largely generic and not changed, they are relatively easy to exploit – granting complete access to a system or network through the embedded credentials on the target device,” said Shlomi Dinoor, Vice President emerging technologies at Cyber-Ark Software. “To put this threat in context, supporting infrastructures for today’s virtualized environments have become a network of access points enabling interaction between systems. Many of these access points are privileged in that they are highly powerful and suffer from relatively poor controls – leading to privileged access point vulnerabilities. Cyber criminals understand the potential of these privileged access points and are using the vulnerabilities to transform the cyber crime frontier. It’s also an indication of how the privileged identity management challenge is pervasive in an organization. In reality, organizations need to look at everything that has a microprocessor, memory or an application/process running – these all have similar embedded credentials that represent significant organizational vulnerabilities. This further proves that “faith based security” – relying on vendors to provide systems with built-in robust security- is not a good practice.”
SecurityWeek contacted HP and has received a response, and is waiting on official comment. We will update when a response is received.
Update 11:23AM EST 12/15/2010 – SecurityWeek has received a statement from HP on the issue: “HP identified a potential security issue with the HP StorageWorks P2000 G3 only. This does not impact HP’s entire MSA line of storage solutions. HP has identified an immediate fix for this issue and is rapidly informing customers of the solution.“
HP has now published a support document on the issue with instructions on how to fix it. Key point mentioned is that the password should be changed after anytime the administrator restores factory settings, as the restore defaults command will restore the services with the default password.
More from SecurityWeek News
- Threat Hunting Summit Virtual Event NOW LIVE
- Video: ESG – CISO’s Guide to an Emerging Risk Cornerstone
- Threat Modeling Firm IriusRisk Raises $29 Million
- SentinelOne Announces $100 Million Venture Fund
- Today: 2022 CISO Forum Virtual Event
- Cymulate Closes $70M Series D Funding Round
- SecurityWeek to Host CISO Forum Virtually September 13-14, 2022: Registration is Open
- Privilege Escalation Flaw Haunts VMware Tools
Latest News
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- New York Man Arrested for Running BreachForums Cybercrime Website
- Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder
- Latitude Financial Services Data Breach Impacts 300,000 Customers
- US Government Warns Organizations of LockBit 3.0 Ransomware Attacks
- New ‘Trigona’ Ransomware Targets US, Europe, Australia
- New Espionage Group ‘YoroTrooper’ Targeting Entities in European, CIS Countries
