HPE Network Automation RCE Vulnerability (Sept 30, 2016)

By

HPE Network Automation software is a management tool for tracking, regulating and automating configurations and software changes across the distributed network. HPE Network Automation software is using Java modules to supply its functionalities.

An arbitrary code execution vulnerability has been discovered in HPE Network Automation software 9.1x, 9.2x, 10.0x before 10.00.02.01, and 10.1x before 10.11.00.01. A remote attack can exploit the target through a crafted serialized Java object, related to the Apache Commons Collections (ACC) library. A successful exploitation can result in the execution of arbitrary code under the context of the HPE Network Automation service on the target server. HPE has released the patch for this vulnerability on Sept 20, 2016.

Dell SonicWALL threat research team has researched this vulnerability and released the following IPS signature:

  • IPS:11887 HPE Network Automation Insecure Deserialization

This vulnerability is referred by CVE as CVE-2016-4385.

Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.