CVE-2020-7131

9.0 CRITICAL

📋 TL;DR

CVE-2020-7131 is a critical vulnerability in HPE NonStop systems' maintenance entities that allows attackers with access to the maintenance LAN to exploit an open UDP port 17185. This can lead to information disclosure, denial-of-service, memory corruption, or potentially complete system takeover. The vulnerability affects Blade Maintenance Entity, Integrated Maintenance Entity, and Maintenance Entity products on J/H-series NonStop systems.

💻 Affected Systems

Products:
  • Blade Maintenance Entity
  • Integrated Maintenance Entity
  • Maintenance Entity
Versions: J06.04.00 through J06.23.01 for J-series; all H-series versions
Operating Systems: HPE NonStop OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability only exists if attacker has access to the Maintenance LAN where these entities are connected. No fix planned for H-series systems or T2805 Maintenance Entity product.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing full control of the affected NonStop system, potentially leading to data theft, service disruption, or lateral movement within the maintenance network.

🟠

Likely Case

Information disclosure and denial-of-service attacks against maintenance entities, disrupting system maintenance capabilities and potentially exposing sensitive maintenance data.

🟢

If Mitigated

Limited impact if maintenance LAN is properly segmented and UDP port 17185 is blocked at network boundaries.

🌐 Internet-Facing: LOW - The vulnerability requires access to the maintenance LAN, which should not be internet-facing in properly configured environments.
🏢 Internal Only: HIGH - Attackers with internal access to the maintenance LAN can exploit this vulnerability with significant impact potential.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the maintenance LAN but no authentication. The vulnerability involves an open UDP service that can be targeted with crafted packets.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SPR T1805A01^AAI (Integrated Maintenance Entity), SPR T4805A01^AAZ (Blade Maintenance Entity)

Vendor Advisory: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03996en_us

Restart Required: Yes

Instructions:

1. Download appropriate SPR from HPE support portal. 2. Apply SPR T1805A01^AAI for Integrated Maintenance Entity or T4805A01^AAZ for Blade Maintenance Entity. 3. Restart affected maintenance entities. 4. Verify UDP port 17185 is no longer open or properly secured.

🔧 Temporary Workarounds

Block UDP Port 17185

all

Block UDP port 17185 at the network switch or firewall level in the maintenance LAN to prevent exploitation.

# Example firewall rule (platform specific)
# iptables -A INPUT -p udp --dport 17185 -j DROP
# Windows: netsh advfirewall firewall add rule name="Block CVE-2020-7131" dir=in action=block protocol=UDP localport=17185

🧯 If You Can't Patch

  • Implement strict network segmentation for maintenance LAN, ensuring only authorized maintenance systems can access it.
  • Deploy network monitoring and intrusion detection for UDP port 17185 traffic with alerting on suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check if UDP port 17185 is open and listening on maintenance entity systems using: nmap -sU -p 17185 <maintenance_entity_ip> or netstat -anu | grep 17185

Check Version:

Check NonStop system version and installed SPRs using appropriate NonStop commands (varies by system configuration).

Verify Fix Applied:

Verify UDP port 17185 is no longer open or properly secured after applying SPRs. Check system logs for successful SPR installation and verify with vendor documentation.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected connections or traffic to UDP port 17185
  • Memory corruption errors in maintenance entity logs
  • Denial-of-service events affecting maintenance capabilities

Network Indicators:

  • Unusual UDP traffic patterns on port 17185
  • Scanning activity targeting port 17185 in maintenance LAN
  • Crafted UDP packets to port 17185

SIEM Query:

source_port=17185 OR dest_port=17185 protocol=UDP AND (event_type=scan OR bytes_sent>threshold OR pattern_match="malicious_payload")

🔗 References

📤 Share & Export