惠普MSA2000磁盘阵列发现后门

来源:百度文库 编辑:神马文学网 时间:2024/07/04 21:48:15

P2000/MSA Disk Arrays


惠普MSA2000磁盘阵列产品中发现了一个与硬编码密码相关的安全漏洞,受到影响的产品型号是MSA2000 G3。系统内置了一个隐蔽用户,而且没有在用户管理器中显示出来,该用户的密码也无法修改,为攻击者提供了一个获取储存在设备上的敏感信息的完美后门。硬编码的用户名和密码十分简单:用户名admin,密码!admin。

BackdoorVulnerability Discovered on HP MSA2000 Storage Systems


“Backdoor” Vulnerability Discovered on HP MSA2000 Storage Systems

A hardcoded password-related security vulnerability has been discovered which apparently affects everyHP MSA2000 G3 modular storage array shipped to date.

Apparently a hidden user exists, that is built into the system and doesn’t show up in the user manager, and the password may not be able to be changed (unconfirmed), creating a perfect “backdoor” opportunity for an attacker to gain access to potentially sensitive information stored on the device, as well as systems it is connected to. The hard coded user and password in the HP MSA2000 is set to an embarrassingly simple:

username: admin

password: !admin

Because the password can’t be changed or deleted, it creates another serious enterprise vulnerability. Similar vulnerabilities were recently discovered in Cisco Unified Video Conferencing products, where a linux shadow password file contained three hard-coded usernames and passwords.

“The practice of embedding hardcoded passwords, as demonstrated in this most recent HP storage device example, is not only commonplace, but extremely risky. So too is the practice of attempting to ship systems with “hidden” admin users, but in this age of openness, nothing is hidden, and vendors should know that. Because the passwords are largely generic and not changed, they are relatively easy to exploit – granting complete access to a system or network through the embedded credentials on the target device,” said Shlomi Dinoor, Vice President emerging technologies at Cyber-Ark Software. “To put this threat in context, supporting infrastructures for today’s virtualized environments have become a network of access points enabling interaction between systems. Many of these access points are privileged in that they are highly powerful and suffer from relatively poor controls - leading to privileged access point vulnerabilities. Cyber criminals understand the potential of these privileged access points and are using the vulnerabilities to transform the cyber crime frontier. It’s also an indication of how the privileged identity management challenge is pervasive in an organization. In reality, organizations need to look at everything that has a microprocessor, memory or an application/process running – these all have similar embedded credentials that represent significant organizational vulnerabilities. This further proves that “faith based security” - relying on vendors to provide systems with built-in robust security- is not a good practice.”

SecurityWeek contacted HP and has received a response, and is waiting on official comment. We will update when a response is received.