CVE-2022-28620

9.8 CRITICAL

📋 TL;DR

This CVE describes a remote authentication bypass vulnerability in HPE Cray supercomputing systems that allows attackers to bypass authentication mechanisms without valid credentials. It affects HPE Cray Legacy Shasta System Solutions, HPE Slingshot, and HPE Cray EX supercomputers with specific firmware versions. Organizations using these HPE supercomputing systems are at risk.

💻 Affected Systems

Products:
  • HPE Cray Legacy Shasta System Solutions
  • HPE Slingshot
  • HPE Cray EX Supercomputers
Versions: Prior to node controller firmware 1.6.27/1.5.33/1.4.27 for liquid cooled blades; Prior to chassis controller firmware 1.6.27/1.5.33/1.4.27 for liquid cooled cabinets; All Slingshot versions prior to 1.7.2
Operating Systems: Firmware-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware versions on HPE Cray EX liquid cooled blades and cabinets. The vulnerability exists in the authentication mechanism of these specialized supercomputing components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of supercomputing infrastructure allowing unauthorized access to sensitive computational resources, potential data exfiltration, and disruption of critical research or operational workloads.

🟠

Likely Case

Unauthorized access to system management interfaces leading to privilege escalation, configuration changes, and potential lateral movement within the supercomputing environment.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring that detects authentication anomalies before exploitation occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows remote authentication bypass, suggesting relatively straightforward exploitation once the attack vector is understood. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Node controller firmware: 1.6.27/1.5.33/1.4.27 or later; Chassis controller firmware: 1.6.27/1.5.33/1.4.27 or later; Slingshot: 1.7.2 or later

Vendor Advisory: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbcr04284en_us

Restart Required: Yes

Instructions:

1. Download the updated firmware from HPE support portal. 2. Follow HPE's firmware update procedures for Cray systems. 3. Apply firmware updates to affected node controllers and chassis controllers. 4. Apply Slingshot update to version 1.7.2 or later. 5. Reboot affected systems as required by the update process.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate management interfaces from untrusted networks and implement strict network access controls

Access Control Lists

all

Implement IP-based restrictions to limit access to management interfaces to authorized administrative networks only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Deploy additional authentication layers and monitoring for authentication attempts on affected interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware versions on HPE Cray EX liquid cooled blades (node controller) and cabinets (chassis controller), and Slingshot software version

Check Version:

Use HPE Cray system management tools to query firmware versions (specific commands vary by system configuration)

Verify Fix Applied:

Verify firmware versions are at or above: Node controller: 1.6.27/1.5.33/1.4.27; Chassis controller: 1.6.27/1.5.33/1.4.27; Slingshot: 1.7.2

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Authentication logs showing access from unexpected sources
  • Configuration changes without proper authentication records

Network Indicators:

  • Unauthorized access attempts to management interfaces
  • Traffic to management ports from unexpected sources

SIEM Query:

Authentication logs where source IP not in allowed administrative range AND result=success

🔗 References

📤 Share & Export