First published: Tue Aug 14 2018(Updated: )
A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be exploited remotely to allow code execution.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hp 3par Service Provider | =sp-4.2.0-ga | |
Hp 3par Service Provider | =sp-4.3.0-ga-17 | |
Hp 3par Service Provider | =sp-4.3.0-ga-24 | |
Hp 3par Service Provider | =sp-4.4.0-ga-22 | |
Hp 3par Service Provider | =sp-4.4.0-ga-30 | |
Hp 3par Service Provider | =sp-4.4.0-ga-53 | |
Hp 3par Service Provider | =sp-4.4.0-ga-58 | |
Hp 3par Service Provider | =sp-4.4.0-ga-86 | |
Hp 3par Service Provider | =sp-4.4.0-ga-88 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7096 is considered to have a high severity level due to its potential for remote code execution.
To fix CVE-2018-7096, update the 3PAR Service Processor to version SP-4.4.0.GA-110(MU7) or later.
CVE-2018-7096 affects 3PAR Service Processor versions prior to SP-4.4.0.GA-110(MU7).
Yes, CVE-2018-7096 can be exploited remotely, allowing an attacker to execute arbitrary code.
CVE-2018-7096 is classified as a remote code execution vulnerability.