CVE-2022-28616

9.8 CRITICAL

📋 TL;DR

This SSRF vulnerability in HPE OneView allows attackers to make unauthorized requests from the vulnerable server to internal systems. Attackers could potentially access sensitive internal services, exfiltrate data, or pivot to other network resources. Organizations running HPE OneView versions prior to 7.0 are affected.

💻 Affected Systems

Products:
  • HPE OneView
Versions: All versions prior to 7.0
Operating Systems: Not OS-specific - affects HPE OneView application
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of HPE OneView prior to version 7.0 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal infrastructure through server-side request forgery leading to data exfiltration, lateral movement, and potential full network takeover.

🟠

Likely Case

Unauthorized access to internal services, sensitive data exposure, and potential privilege escalation within the affected environment.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for information disclosure about internal network structure.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can directly exploit this vulnerability without internal access.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or through compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: HPE OneView 7.0 or later

Vendor Advisory: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04278en_us

Restart Required: Yes

Instructions:

1. Download HPE OneView version 7.0 or later from HPE support portal. 2. Backup current configuration. 3. Apply the update following HPE's upgrade documentation. 4. Restart the OneView services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from HPE OneView servers to only necessary internal services

Firewall Rules

all

Implement strict egress filtering to prevent SSRF exploitation to internal networks

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate HPE OneView from sensitive internal systems
  • Deploy web application firewall with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check HPE OneView version via web interface or CLI. If version is below 7.0, system is vulnerable.

Check Version:

Check via HPE OneView web interface or consult HPE documentation for version checking commands

Verify Fix Applied:

Verify version is 7.0 or higher and test SSRF functionality is no longer exploitable.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP/HTTPS requests from HPE OneView server
  • Requests to internal IP addresses or services from OneView

Network Indicators:

  • Unexpected traffic patterns from HPE OneView to internal services
  • SSRF payloads in HTTP requests

SIEM Query:

source="hpe-oneview" AND (dest_ip=private_ip_range OR request_uri CONTAINS "internal" OR request_uri CONTAINS "localhost")

🔗 References

📤 Share & Export