CVE-2019-12002

9.8 CRITICAL

📋 TL;DR

This CVE describes a remote session reuse vulnerability in multiple HPE MSA SAN Storage models that allows attackers to bypass access restrictions. Attackers can reuse valid sessions to gain unauthorized access to storage systems. Affected organizations are those running vulnerable versions of HPE MSA 1040, 1050, 2040, 2042, 2050, and 2052 SAN Storage systems.

💻 Affected Systems

Products:
  • HPE MSA 2040 SAN Storage
  • HPE MSA 1040 SAN Storage
  • HPE MSA 1050 SAN Storage
  • HPE MSA 2042 SAN Storage
  • HPE MSA 2050 SAN Storage
  • HPE MSA 2052 SAN Storage
Versions: GL225P001 and earlier, VE270R001-01 and earlier, VL270R001-01 and earlier
Operating Systems: SAN Storage Firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions are vulnerable in default configurations. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SAN storage systems leading to data theft, destruction, or ransomware deployment across connected infrastructure.

🟠

Likely Case

Unauthorized access to storage management interfaces allowing configuration changes, data access, or denial of service.

🟢

If Mitigated

Limited impact if systems are isolated, patched, and monitored with proper access controls.

🌐 Internet-Facing: HIGH - Storage systems exposed to internet are directly vulnerable to remote exploitation.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires initial session establishment but then allows session reuse for unauthorized access. Attack complexity is low once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after GL225P001, VE270R001-01, and VL270R001-01

Vendor Advisory: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03940en_us

Restart Required: Yes

Instructions:

1. Download latest firmware from HPE Support Portal. 2. Backup current configuration. 3. Apply firmware update following HPE MSA firmware update procedures. 4. Reboot storage system. 5. Verify firmware version after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate SAN storage management interfaces from untrusted networks

Session Timeout Reduction

all

Configure shorter session timeout values if supported by firmware

🧯 If You Can't Patch

  • Implement strict network access controls to limit SAN management interface access to authorized IPs only
  • Monitor for unusual authentication patterns and session reuse attempts in logs

🔍 How to Verify

Check if Vulnerable:

Check firmware version via SAN management interface or CLI. Compare against affected versions: GL225P001 and earlier, VE270R001-01 and earlier, VL270R001-01 and earlier.

Check Version:

Check via SAN management web interface or use 'show version' command in SAN CLI

Verify Fix Applied:

Verify firmware version is updated beyond vulnerable versions listed in advisory.

📡 Detection & Monitoring

Log Indicators:

  • Multiple sessions from same source with different credentials
  • Session reuse patterns
  • Unauthorized access attempts to storage management

Network Indicators:

  • Unusual traffic patterns to SAN management ports
  • Multiple authentication attempts from same source

SIEM Query:

source="san_logs" AND (event_type="session_reuse" OR auth_failure_count>5)

🔗 References

📤 Share & Export