CVE-2024-5143

6.8 MEDIUM

📋 TL;DR

This vulnerability allows device administrators to change SMTP server settings without re-entering credentials, potentially exposing original SMTP credentials by redirecting email traffic. It affects HP devices with administrative users who can modify SMTP configurations.

💻 Affected Systems

Products:
  • HP ThinPro OS
Versions: ThinPro 7.2 and 8.0
Operating Systems: HP ThinPro OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires device administrative privileges to exploit. Affects systems where SMTP server configuration is used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Original SMTP server credentials are captured by an attacker-controlled server, leading to unauthorized email sending, credential reuse attacks, and potential data exfiltration.

🟠

Likely Case

Malicious administrator or compromised admin account redirects email traffic to capture SMTP credentials, enabling unauthorized email operations.

🟢

If Mitigated

Limited to authorized administrators only, with monitoring detecting unusual SMTP configuration changes.

🌐 Internet-Facing: MEDIUM - Requires administrative access but could expose credentials to external attackers if admin account is compromised.
🏢 Internal Only: HIGH - Internal administrators can exploit this without external interaction, making it a significant insider threat.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative access to the device. The vulnerability is straightforward to exploit once admin access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ThinPro 7.2 MR7 and ThinPro 8.0 MR5

Vendor Advisory: https://support.hp.com/us-en/document/ish_10643804-10643841-16/HPSBPI03941

Restart Required: Yes

Instructions:

1. Download the latest maintenance release from HP support. 2. Apply the update to affected ThinPro devices. 3. Restart devices to complete installation.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit device administrative privileges to trusted personnel only and implement least privilege principles.

Monitor SMTP Configuration Changes

all

Implement logging and alerting for any changes to SMTP server settings.

🧯 If You Can't Patch

  • Implement strict access controls and monitor administrative account activity.
  • Use separate SMTP accounts with limited permissions to minimize credential exposure impact.

🔍 How to Verify

Check if Vulnerable:

Check ThinPro OS version via system settings or command line. Versions 7.2 and 8.0 before maintenance releases are vulnerable.

Check Version:

cat /etc/thinpro_version or check System Information in ThinPro settings

Verify Fix Applied:

Verify ThinPro OS version is 7.2 MR7 or 8.0 MR5 or later after applying patches.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected changes to SMTP server configuration
  • Administrative account modifying email settings outside normal patterns

Network Indicators:

  • SMTP traffic redirected to new/unexpected servers
  • Unusual email sending patterns from the device

SIEM Query:

source="thinpro_logs" AND (event="smtp_config_change" OR user="admin" AND action="modify_email_settings")

🔗 References

📤 Share & Export