First published: Tue Feb 09 2021(Updated: )
A potential security vulnerability has been identified in the HPE Moonshot Provisioning Manager v1.20. The HPE Moonshot Provisioning Manager is an application that is installed in a VMWare or Microsoft Hyper-V environment that is used to setup and configure an HPE Moonshot 1500 chassis. This vulnerability could be remotely exploited by an unauthenticated user to cause a stack based buffer overflow using user supplied input to the `khuploadfile.cgi` CGI ELF. The stack based buffer overflow could lead to Remote Code Execution, Denial of Service, and/or compromise system integrity. **Note:** HPE recommends that customers discontinue the use of the HPE Moonshot Provisioning Manager. The HPE Moonshot Provisioning Manager application is discontinued, no longer supported, is not available to download from the HPE Support Center, and no patch is available.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
HP Moonshot Provisioning Manager Appliance | =1.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25139 has been classified with a medium severity level.
To resolve CVE-2021-25139, you should apply the latest patches from HPE for the Moonshot Provisioning Manager version 1.20.
CVE-2021-25139 affects the HPE Moonshot Provisioning Manager version 1.20 installed in VMWare or Microsoft Hyper-V environments.
CVE-2021-25139 is identified as a potential security vulnerability related to the HPE Moonshot Provisioning Manager's configuration and setup features.
Currently, the best approach for CVE-2021-25139 is to update to the patched version provided by HPE to mitigate the risk.