This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center Smart Connect with Wireless Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UrlAccessController servlet. The issue results from the lack of proper filtering of URLs. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Affected Software | Affected Version | How to fix |
---|---|---|
Hewlett Packard Enterprise Intelligent Management Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-4757 has a high severity rating due to its ability to allow remote privilege escalation without authentication.
To fix ZDI-CAN-4757, ensure that you have updated to the latest version of Hewlett Packard Enterprise Intelligent Management Center as recommended by the vendor.
Organizations using vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center Smart Connect with Wireless Manager are affected by ZDI-CAN-4757.
Exploiting ZDI-CAN-4757 allows attackers to escalate their privileges, potentially gaining unauthorized access to sensitive information and control over the system.
No, ZDI-CAN-4757 can be exploited without any authentication, making it particularly dangerous.