CVE-2024-51766

6.5 MEDIUM

📋 TL;DR

A denial-of-service vulnerability in HPE NonStop DISK UTIL (T9208) allows attackers to crash NonStop servers by exploiting improper condition handling. This affects all prior versions of DISK UTIL on L-series and J-series NonStop systems. Organizations running these HPE NonStop systems are vulnerable.

💻 Affected Systems

Products:
  • HPE NonStop DISK UTIL (T9208)
Versions: All prior versions
Operating Systems: HPE NonStop OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both L-series and J-series NonStop systems. Requires access to execute DISK UTIL commands.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash requiring manual intervention to restore NonStop server availability, potentially disrupting critical transaction processing.

🟠

Likely Case

Service disruption affecting disk utility operations and dependent services on the NonStop server.

🟢

If Mitigated

Limited impact if systems are isolated and have proper monitoring for DoS attempts.

🌐 Internet-Facing: LOW - NonStop systems typically run critical backend infrastructure not directly internet-exposed.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to disrupt critical NonStop services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires access to execute DISK UTIL commands. No public exploit details available as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest DISK UTIL version as specified in HPE advisory

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbns04759en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Review HPE advisory for specific patch details. 2. Apply HPE-provided update for DISK UTIL (T9208). 3. Restart affected NonStop systems. 4. Verify patch application.

🔧 Temporary Workarounds

Restrict DISK UTIL access

all

Limit access to DISK UTIL commands to authorized administrators only

Configure NonStop security to restrict T9208 utility execution

Monitor for DoS attempts

all

Implement monitoring for unusual DISK UTIL activity or system crashes

Set up alerts for system crashes or DISK UTIL anomalies

🧯 If You Can't Patch

  • Implement strict access controls to limit who can execute DISK UTIL commands
  • Monitor system logs for crash events and DISK UTIL usage patterns

🔍 How to Verify

Check if Vulnerable:

Check DISK UTIL version on NonStop systems and compare against patched versions in HPE advisory

Check Version:

Use NonStop system commands to check T9208 version (specific command varies by NonStop configuration)

Verify Fix Applied:

Verify DISK UTIL version after update matches patched version from HPE advisory

📡 Detection & Monitoring

Log Indicators:

  • System crash logs
  • Unexpected DISK UTIL process termination
  • High frequency of DISK UTIL command execution

Network Indicators:

  • Unusual administrative access patterns to NonStop systems

SIEM Query:

source="NonStop" AND (event_type="crash" OR process="T9208" AND termination="abnormal")

🔗 References

📤 Share & Export