Remote code execution in HP Network Automation - CVE-2016-4385
Published: September 21, 2016
Vulnerability identifier: #VU592
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2016-4385
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Hewlett Packard Enterprise Development LP
Affected software:
HP Network Automation
HP Network Automation
Detailed vulnerability description
The vulnerability allows a remote user to cause remote code execution on the target system.
The weakness is caused by security bypass. The vulnerability is used for handling Java object deserialization in Apache Commons-Collections and Commons-BeanUtils library and allows a remote user to trigger code execution.
Successful exploitation of the vulnerability leads to remote code execution on the vulnerable system.
The weakness is caused by security bypass. The vulnerability is used for handling Java object deserialization in Apache Commons-Collections and Commons-BeanUtils library and allows a remote user to trigger code execution.
Successful exploitation of the vulnerability leads to remote code execution on the vulnerable system.
How to mitigate CVE-2016-4385
Install patched version from vendor's website:
https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetsearch/document/LID/NA_00033(10.00.02.01)
https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetsearch/document/LID/NA_00030
https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetsearch/document/LID/NA_00034
(10.11.00.01)