First published: Tue Aug 14 2018(Updated: )
A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be exploited remotely to allow access restriction bypass.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hp 3par Service Provider | =sp-4.2.0-ga | |
Hp 3par Service Provider | =sp-4.3.0-ga-17 | |
Hp 3par Service Provider | =sp-4.3.0-ga-24 | |
Hp 3par Service Provider | =sp-4.4.0-ga-22 | |
Hp 3par Service Provider | =sp-4.4.0-ga-30 | |
Hp 3par Service Provider | =sp-4.4.0-ga-53 | |
Hp 3par Service Provider | =sp-4.4.0-ga-58 | |
Hp 3par Service Provider | =sp-4.4.0-ga-86 | |
Hp 3par Service Provider | =sp-4.4.0-ga-88 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7095 has been classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2018-7095, upgrade the 3PAR Service Processor to version SP-4.4.0.GA-110(MU7) or later.
CVE-2018-7095 allows an attacker to bypass access restrictions on affected systems.
Versions SP-4.2.0 GA, SP-4.3.0 GA-17, SP-4.3.0 GA-24, and SP-4.4.0 up to GA-88 are affected by CVE-2018-7095.
Organizations using the specified vulnerable versions of the HP 3PAR Service Processor should take immediate action to mitigate CVE-2018-7095.