Vulnerabilities

Updates Fix Several Vulnerabilities in HP Network Automation

HP has released updates to address several remotely exploitable vulnerabilities in HP Network Automation.

<p><strong><span><span>HP has released updates to address several remotely exploitable vulnerabilities in HP Network Automation.</span></span></strong></p>

HP has released updates to address several remotely exploitable vulnerabilities in HP Network Automation.

Part of HP’s network management offering, HP Network Automation is a software solution that automates the operational lifecycle of network devices, including provisioning, compliance, management, and security administration. The product, available in Premium and Ultimate versions, tracks, regulates, and automates configuration and software changes across distributed, multi-vendor networks.

Multiple flaws affecting this product have been identified and reported to HP by Tim MalcomVetter of FishNet Security. The researcher discovered cross-site request forgery (CSRF), cross-site scripting (XSS), clickjacking, and other types of vulnerabilities.

“A remote, unauthenticated attacker may be able to trick an authenticated user into making an unintentional request to the web server that will be treated as an authentic request, leading to the possibility of privilege escalation, information leakage, code execution, or denial of service,” the CERT Coordination Center wrote in an advisory published on Friday.

The flaws have been assigned the CVE identifier CVE-2014-7886. The CVSS base score assigned by HP is 6.0, while the score in CERT/CC’s report is 6.8, which puts the bugs in the “medium severity” category.

The vulnerabilities affect HP Network Automation 9.0x, 9.1x, 9.2x and 10.0, HP said in its own advisory. The company has released HP Network Automation 9.22.02 and 10.00.01 to resolve the security holes. Organizations are advised to update their installations.

Earlier this year, HP fixed vulnerabilities in products such as Universal Configuration Management Database (UCMDB), ArcSight Enterprise Security Manager (ESM), and ArcSight Logger.

Researchers who identify security bugs in HP products are advised to report them to security-alert(at)hp.com.

Advertisement. Scroll to continue reading.

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version