HPE has released a new security bulletin disclosing a zero-day vulnerability in the latest version of its Systems Insight Manager (SIM) server software.
HPE SIM is a management and remote support automation solution for Windows and Linux intended to be used with the company's servers, storage and networking products.
The recently disclosed zero-day vulnerability, tracked as CVE-2020-7200, was first reported by security researcher Harrison Neal through Trend Micro's Zero Day Initiative and it affects version 7.6 of the company's SIM software.
- We've put together a list of the best endpoint protection software available
- These are the best small business servers on the market
- Also check out our roundup of the best bare metal hosting providers
Although HPE has released mitigation info for the vulnerability and is currently working on a patch to fully address the issue, it did not reveal whether the zero-day is being actively exploited in the wild.
Remote code execution
HPE has given the vulnerability a critical severity rating of 9.8 as it can be exploited by attackers with no privileges to remotely execute code on servers running the vulnerable version of its SIM software.
In its security bulletin, the company explained that the vulnerability can be mitigated by disabling SIM's “Federated Search” and “Federated CMS Configuration” features. HPE will also release a complete fix that prevents the remote code execution vulnerability in the coming weeks.
For now though, system admins who use HPE's SIM management software will need to stop the HPE SIM Service, delete the simsearch.ware file, restart the service and execute the command “mxtool -r -f tools\multi-cms-search.xml 1>nul 2>nul” from a command prompt.
While this will prevent the vulnerability from being exploited by potential attackers, it will also mean that HPE SIM users can no longer use the federated search feature.
- We've also highlighted the best antivirus software
Via BleepingComputer
from TechRadar - All the latest technology news https://ift.tt/3r7gGY3
No comments:
Post a Comment