In Enterprise Networking Operating System (ENOS) in Lenovo and IBM RackSwitch and BladeCenter products, an authentication bypass known as "HP Backdoor" was discovered during a Lenovo security audit in the serial console, Telnet, SSH, and Web interfaces. This bypass mechanism can be accessed when performing local authentication under specific circumstances. If exploited, admin-level access to the switch is granted.
References
Link | Resource |
---|---|
https://support.lenovo.com/us/en/product_security/LEN-16095 | Mitigation Patch Vendor Advisory |
http://www.securitytracker.com/id/1040296 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Information
Published : 2018-01-10 10:29
Updated : 2018-02-06 06:12
NVD link : CVE-2017-3765
Mitre link : CVE-2017-3765
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
lenovo
- flex_system_fabric_cn4093_10gb_converged_scalable_switch
- flex_system_fabric_en4093r_10gb_scalable_switch
- rackswitch_g8264
- rackswitch_g8332
- flex_system_si4091_system_interconnect_module
- rackswitch_g8124e
- flex_system_fabric_si4093_10gb_system_interconnect_module
- rackswitch_g8264cs
- rackswitch_g8052
- rackswitch_g7052
- rackswitch_g8272
- rackswitch_g7028
- enterprise_network_operating_system
- rackswitch_g8296
ibm
- 1g_l2-7_slb_switch_for_bladecenter
- bladecenter_virtual_fabric_10gb_switch_module
- rackswitch_g8264cs
- flex_system_fabric_cn4093_10gb_converged_scalable_switch
- bladecenter_1\
- flex_system_fabric_en4093\/en4093r_10gb_scalable_switch
- rackswitch_g8052
- rackswitch_g8264t
- flex_system_fabric_si4093_10gb_system_interconnect_module
- rackswitch_g8264
- rackswitch_g8124e
- bladecenter_layer_2\/3_copper_ethernet_switch_module
- flex_system_en2092_1gb_ethernet_scalable_switch
- rackswitch_g8332
- rackswitch_g8124
- rackswitch_g8316