Hewlett Packard AdvanceStack Switch Managment Authentication Bypass Vulnerability

2002-02-12T00:00:00
ID SECURITYVULNS:DOC:2473
Type securityvulns
Reporter Securityvulns
Modified 2002-02-12T00:00:00

Description

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Hewlett Packard AdvanceStack Switch Managment Authentication Bypass Vulnerability

Type: Access Validation Error

Release Date: February 8, 2002

Product / Vendor: HP AdvanceStack 10Base-T Switching Hubs combine economical 10Base-T functionality with the performance of switching. Each switching hub starts out as a simple, single-segment, shared 10Base-T hub.

http://www.hp.com

Summary: A problem with the HP switch allows some users to change configuration of the switch. A bug introduced in the HP AdvanceStack J3210A that could allow users full access on the switch. Upon taking advantage of this vulnerability, the user could change the configuration of the switch and could change admin password.

Therefore, it is possible for a superuser password changing with unprivileged access on the switch to gain elevated privileges, and potentially change configuration of the switch.

Exploit: An attacker can get unauthorized access to the switch read/write password change page this page http://host/security/web_access.html and change superuser password. Connect superuser privileged via Web or Telnet.

Tested: HP J3210A AdvanceStack

Vulnerable: HP J3210A AdvanceStack

Disclaimer: http://www.securityoffice.net is not responsible for the misuse or illegal use of any of the information and/or the software listed on this security advisory.

Author: Tamer Sahin ts@securityoffice.net http://www.securityoffice.net

Tamer Sahin http://www.securityoffice.net PGP Key ID: 0x2B5EDCB0

-----BEGIN PGP SIGNATURE----- Version: PGP 7.1

iQA/AwUBPGOBeruLpFMrXtywEQKW3wCgqbksI86Ux1LfIDwmI7jyq3jX3JgAoPAB lOcQNvFblLfg5xdxVm405wto =d4o/ -----END PGP SIGNATURE-----