First published: Thu Feb 15 2018(Updated: )
A remote code execution vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
HP Network Automation | =9.10 | |
HP Network Automation | =9.20 | |
HP Network Automation | =9.22 | |
HP Network Automation | =9.22.01 | |
HP Network Automation | =9.22.02 | |
HP Network Automation | =10.00 | |
HP Network Automation | =10.00.01 | |
HP Network Automation | =10.00.02 | |
HP Network Automation | =10.10 | |
HP Network Automation | =10.11 | |
HP Network Automation | =10.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5811 has been classified as a critical remote code execution vulnerability.
The recommended fix for CVE-2017-5811 is to upgrade to a patched version of HPE Network Automation that is not affected by this vulnerability.
CVE-2017-5811 affects HPE Network Automation versions 9.1x, 9.2x, 10.0x, 10.1x, and 10.2x.
Yes, CVE-2017-5811 allows for remote code execution, making it possible for attackers to exploit it from a remote location.
If immediate upgrading is not possible for CVE-2017-5811, implement defensive measures such as firewall rules to restrict access to the affected service.