#VU90 Information disclosure in Oracle Hardware solutions


Published: 2016-07-05 | Updated: 2018-11-22

Vulnerability identifier: #VU90

Vulnerability risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-2808

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
HPE Service Manager
Client/Desktop applications / Software for system administration
Oracle Communications Policy Management
Other software / Other software solutions
SPARC Enterprise M3000
Hardware solutions / Firmware
SPARC Enterprise M4000
Hardware solutions / Firmware
SPARC Enterprise M5000
Hardware solutions / Firmware
SPARC Enterprise M8000
Hardware solutions / Firmware
SPARC Enterprise M9000
Hardware solutions / Firmware

Vendor: Hewlett Packard Enterprise Development LP
Oracle

Description
The vulnerability allows a remote attacker to obtain potentially sensitive information communicated by target system.

The vulnerability exists due to access control error. A remote unauthenticated attacker can obtain RC4 encrypted data and conduct a brute-force key guessing attack by monitoring TLS network traffic.

Successful exploitation of this vulnerability may result in disclosure of system information.

Mitigation
Update the versions 9.30, 9.31, 9.32, 9.33, 9.34 at: http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05193347

Vulnerable software versions

HPE Service Manager: 9.30 - 9.40

Oracle Communications Policy Management: 9.9.0 - 9.9.1

SPARC Enterprise M3000: XCP 1117 - XCP 1118

SPARC Enterprise M4000: XCP 1118

SPARC Enterprise M5000: XCP 1117 - XCP 1118

SPARC Enterprise M8000: XCP 1117 - XCP 1118

SPARC Enterprise M9000: XCP 1117 - XCP 1118


External links
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05193347
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability