CVE-2021-29212

9.8 CRITICAL

📋 TL;DR

CVE-2021-29212 is a critical directory traversal vulnerability in HPE iLO Amplifier Pack that allows unauthenticated remote attackers to execute arbitrary code. This affects all confidentiality, integrity, and availability of the appliance. Organizations running affected versions of HPE iLO Amplifier Pack are vulnerable to complete system compromise.

💻 Affected Systems

Products:
  • HPE iLO Amplifier Pack
Versions: 1.80, 1.81, 1.90, 1.95
Operating Systems: HPE iLO Amplifier Pack appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. The vulnerability exists in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with full administrative control over the iLO Amplifier Pack appliance, allowing attackers to steal sensitive data, modify configurations, disrupt operations, and pivot to other systems.

🟠

Likely Case

Remote code execution leading to installation of backdoors, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the vulnerable service.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication, making internet-facing instances extremely vulnerable to attack.
🏢 Internal Only: HIGH - Even internally, any network-accessible instance can be exploited by attackers who gain internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is well-documented with public advisories and proof-of-concept details available. Directory traversal vulnerabilities typically have low exploitation complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.96 or later

Vendor Advisory: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04189en_us

Restart Required: Yes

Instructions:

1. Download HPE iLO Amplifier Pack version 1.96 or later from the HPE support portal. 2. Follow HPE's upgrade documentation to apply the update. 3. Restart the iLO Amplifier Pack appliance as required by the update process.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the iLO Amplifier Pack appliance to only trusted management networks

Use firewall rules to block external access: iptables -A INPUT -p tcp --dport 443 -s !TRUSTED_NETWORK -j DROP

Web Interface Disablement

linux

Temporarily disable the web interface if not required for operations

systemctl stop ilo-amplifier-web
systemctl disable ilo-amplifier-web

🧯 If You Can't Patch

  • Isolate the iLO Amplifier Pack appliance on a dedicated management VLAN with strict access controls
  • Implement network-based intrusion detection/prevention systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check the installed version via the web interface (Settings > About) or SSH into the appliance and run: cat /etc/ilo-amplifier/version

Check Version:

cat /etc/ilo-amplifier/version

Verify Fix Applied:

Verify the version is 1.96 or higher using the same methods, and test that directory traversal attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs
  • Multiple failed directory traversal attempts
  • Unexpected process execution from web user context

Network Indicators:

  • HTTP requests containing '../' sequences or path traversal patterns
  • Unusual outbound connections from the iLO Amplifier Pack appliance

SIEM Query:

source="ilo-amplifier" AND (http_uri="*../*" OR http_uri="*..\\*" OR http_uri="*%2e%2e%2f*")

🔗 References

📤 Share & Export