TITLE: HP StorageWorks Command View XP Security Bypass SECUNIA ADVISORY ID: SA12655 VERIFY ADVISORY: http://secunia.com/advisories/12655/ CRITICAL: Not critical IMPACT: Security Bypass WHERE: Local system SOFTWARE: HP StorageWorks Command View XP 1.x http://secunia.com/product/3951/ DESCRIPTION: A vulnerability has been reported in HP StorageWorks Command View XP, which can be exploited by malicious, local users to bypass certain access restrictions. The vulnerability is caused due to an access control error when the integrated management station of the Enterprise-level storage array product line is used. Successful exploitation requires access to the management station and does not work via remote web clients nor the command line interface. The vulnerability affects version 1.8B and prior on the following platforms: * StorageWorks Disk Array XP48 * StorageWorks Disk Array XP128 * Surestore Disk Array XP256 * StorageWorks Disk Array XP512 * StorageWorks Disk Array XP1024 SOLUTION: Grant only trusted administrative users access to management stations. Patches are available for the latest versions at: ftp://cvxp:CMXPupdt@hprc.external.hp.com/ PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: SSRT4794: http://www4.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBST01071 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet@packetstormsecurity.org ----------------------------------------------------------------------