CVE-2020-7146

9.8 CRITICAL

📋 TL;DR

This CVE describes a remote code execution vulnerability in HPE Intelligent Management Center (iMC) where attackers can inject malicious expressions into the devgroupselect component. Successful exploitation allows unauthenticated attackers to execute arbitrary code on affected systems. Organizations running iMC PLAT versions prior to 7.3 (E0705P07) are affected.

💻 Affected Systems

Products:
  • HPE Intelligent Management Center (iMC)
Versions: All versions prior to iMC PLAT 7.3 (E0705P07)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected iMC versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with highest privileges, potentially leading to data theft, lateral movement, and persistent backdoors.

🟠

Likely Case

Remote code execution leading to system compromise, credential harvesting, and installation of malware or ransomware.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, this vulnerability can be exploited by attackers who gain network access through other means.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has a high CVSS score, making it attractive for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iMC PLAT 7.3 (E0705P07) or later

Vendor Advisory: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us

Restart Required: Yes

Instructions:

1. Download the patch from HPE support portal. 2. Backup current iMC installation. 3. Apply the patch following HPE documentation. 4. Restart iMC services. 5. Verify successful update.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to iMC management interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport [iMC_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [iMC_PORT] -j DROP

Windows Firewall Rule

windows

Create Windows firewall rule to restrict iMC port access

New-NetFirewallRule -DisplayName "Restrict iMC Access" -Direction Inbound -LocalPort [iMC_PORT] -Protocol TCP -Action Allow -RemoteAddress [TRUSTED_IP]
New-NetFirewallRule -DisplayName "Block iMC Access" -Direction Inbound -LocalPort [iMC_PORT] -Protocol TCP -Action Block

🧯 If You Can't Patch

  • Isolate affected systems in a separate network segment with strict access controls
  • Implement web application firewall (WAF) rules to block expression language injection patterns

🔍 How to Verify

Check if Vulnerable:

Check iMC version via web interface or configuration files. Versions prior to PLAT 7.3 (E0705P07) are vulnerable.

Check Version:

Check iMC web interface at https://[iMC_HOST]:[PORT]/imc/login.jsf or examine installation directory version files

Verify Fix Applied:

Verify iMC version shows PLAT 7.3 (E0705P07) or later in administration interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to devgroupselect endpoints
  • Expression language patterns in request logs
  • Unexpected process execution from iMC service account

Network Indicators:

  • Unusual outbound connections from iMC server
  • Traffic to known malicious IPs from iMC host
  • Exploit kit traffic patterns

SIEM Query:

source="iMC_logs" AND (uri="*devgroupselect*" AND (method="POST" OR method="PUT")) AND (payload="*${*" OR payload="*#{" OR payload="*%{*")

🔗 References

📤 Share & Export