-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Hewlett Packard AdvanceStack Switch Managment Authentication Bypass Vulnerability
Type: Access Validation Error
Release Date: February 8, 2002
Product / Vendor: HP AdvanceStack 10Base-T Switching Hubs combine economical 10Base-T functionality with the performance of switching. Each switching hub starts out as a simple, single-segment, shared 10Base-T hub.
Summary: A problem with the HP switch allows some users to change configuration of the switch. A bug introduced in the HP AdvanceStack J3210A that could allow users full access on the switch. Upon taking advantage of this vulnerability, the user could change the configuration of the switch and could change admin password.
Therefore, it is possible for a superuser password changing with unprivileged access on the switch to gain elevated privileges, and potentially change configuration of the switch.
Exploit: An attacker can get unauthorized access to the switch read/write password change page this page http://host/security/web_access.html and change superuser password. Connect superuser privileged via Web or Telnet.
Tested: HP J3210A AdvanceStack
Vulnerable: HP J3210A AdvanceStack
Disclaimer: http://www.securityoffice.net is not responsible for the misuse or illegal use of any of the information and/or the software listed on this security advisory.
Author: Tamer Sahin firstname.lastname@example.org http://www.securityoffice.net
Tamer Sahin http://www.securityoffice.net PGP Key ID: 0x2B5EDCB0
-----BEGIN PGP SIGNATURE----- Version: PGP 7.1
iQA/AwUBPGOBeruLpFMrXtywEQKW3wCgqbksI86Ux1LfIDwmI7jyq3jX3JgAoPAB lOcQNvFblLfg5xdxVm405wto =d4o/ -----END PGP SIGNATURE-----