CVE-2021-29215
📋 TL;DR
This vulnerability allows remote attackers to bypass access restrictions in HPE Ezmeral Data Fabric's TEZ MapR ecosystem component. It affects systems running vulnerable versions of the TEZ component, potentially enabling unauthorized access to restricted resources. The high CVSS score indicates critical severity.
💻 Affected Systems
- HPE Ezmeral Data Fabric TEZ MapR ecosystem component
📦 What is this software?
Tez by Hpe
Tez by Hpe
Tez by Hpe
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the TEZ component allowing unauthorized data access, privilege escalation, and potential lateral movement within the data fabric environment.
Likely Case
Unauthorized access to restricted TEZ resources and data, potentially exposing sensitive information or allowing unauthorized job execution.
If Mitigated
Limited impact with proper network segmentation and access controls, though the vulnerability still presents a security weakness.
🎯 Exploit Status
Remote access restriction bypass suggests relatively straightforward exploitation once the vulnerability is understood
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Tez-0.8: mapr-tez-0.8.201907081100-1.noarch or later; Tez-0.9: mapr-tez-0.9.201907090334-1.noarch or later; Tez-0.9.2: mapr-tez-0.9.2.0.201907081043-1.noarch or later
Vendor Advisory: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbez04196en_us
Restart Required: Yes
Instructions:
1. Download updated TEZ packages from HPE support portal. 2. Stop TEZ services. 3. Install updated packages using rpm -Uvh. 4. Restart TEZ services. 5. Verify successful update.
🔧 Temporary Workarounds
Network Isolation
linuxRestrict network access to TEZ components using firewall rules
iptables -A INPUT -p tcp --dport [TEZ_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [TEZ_PORT] -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate TEZ components from untrusted networks
- Enhance monitoring and alerting for unauthorized access attempts to TEZ services
🔍 How to Verify
Check if Vulnerable:
Check TEZ package version: rpm -qa | grep mapr-tez
Check Version:
rpm -qa | grep mapr-tez
Verify Fix Applied:
Verify updated package is installed: rpm -qa | grep mapr-tez and compare version against patched versions
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to TEZ services
- Unexpected TEZ job submissions
- Access from unauthorized IP addresses
Network Indicators:
- Unexpected traffic to TEZ service ports
- Connection attempts from external networks
SIEM Query:
source="tez.log" AND (event="unauthorized" OR event="access_denied")