The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of HP/3Com Switch, Router: password disclosure via SNMP

Synthesis of the vulnerability 

An attacker can use the SNMP service, in order to obtain the password of local users on HP/3Com switches/routers.
Impacted products: NETBuilder II, Super Stack PS Hub, Super Stack Switch, ProCurve Switch.
Severity of this bulletin: 3/4.
Creation date: 23/10/2012.
Revision date: 24/10/2012.
Références of this threat: BID-56183, c03515685, CERTA-2012-AVI-604, CVE-2012-3268, HPSBHF02819, SSRT100920, VIGILANCE-VUL-12087, VU#225404.

Description of the vulnerability 

The SNMP service is used to remotely administer a device. Data is stored in MIBs.

The h3c-user.mib and hh3c-user.mib MIBs contain an h3cUserInfoEntry sequence with the following fields:
 - h3cUserName
 - h3cUserPassword (cleartext or hashed)
 - h3cAuthMode
 - h3cUserLevel

The access to these data should be restricted to communities with the read/write privilege. However, on HP/3Com equipments, a read-only community (such as "public", which is enabled by default) can read these authentication data.

An attacker can therefore use the SNMP service, in order to obtain the password of local users on HP/3Com switches/routers.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer vulnerability note impacts software or systems such as NETBuilder II, Super Stack PS Hub, Super Stack Switch, ProCurve Switch.

Our Vigil@nce team determined that the severity of this computer vulnerability announce is important.

The trust level is of type confirmed by the editor, with an origin of intranet client.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this cybersecurity announce.

Solutions for this threat 

HP/3Com Switch, Router: patch SSRT100920.
The patch SSRT100920 is available for most devices:
  http://www.hp.com/networking/support
When the patch is not yet available:
 - use the SNMPv3 authentication
 - use VACM to block SNMPv1/v2c users
 - configure ACLs
 - disable local accounts, and use RADIUS/TACACS+
 - disable SNMP
These procedures are indicated in the HP announce.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an application vulnerability bulletin. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.