Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

A critical unauthenticated remote code execution (RCE) vulnerability in HPE Insight Cluster Management Utility (CMU) v8.2 allows attackers to bypass authentication and execute commands as root on high-performance computing (HPC) clusters, researchers revealed today.

Tracked as CVE-2024-13804, the flaw exposes HPC environments to full cluster compromise through weaponized Java client applications.

Anonymous access to the application
Anonymous access to the application

Technical Breakdown

The vulnerability stems from insecure client-side authorization controls in CMU’s Java Web Start (JNLP) application.

Opening the jar with JD-GUIOpening the jar with JD-GUI
Opening the jar with JD-GUI

While the GUI client initially restricts administrative functions like cluster provisioning, threat actors can:

1. Decompile Critical JAR Components

Attackers reverse-engineered the cmugui_standalone.jar file using tools like JD-GUI, exposing client-side admin checks in the AdminUserModel.java class.

2. Forge Administrative Privileges

By modifying the isAdmin validation to always return true (shown below), attackers unlock restricted functions:

// Original code

public boolean isUserAdmin() { return this.isAdmin; } 

// Weaponized version

public boolean isUserAdmin() { return true; } 

3. Exploit RMI for Root Commands

The modified client leverages CMU’s Java Remote Method Invocation (RMI) on port 1099 to call the ExecuteCmdLine method, executing OS commands via:

java -jar weaponized_cmugui.jar

PoC attacks have demonstrated ifconfig and whoami execution with root privileges on cluster management nodes.

Saving decompiled source codeSaving decompiled source code
Saving decompiled source code

Attack Impact

Successful exploitation enables:
 Full cluster control via management node access
 Lateral movement to integrated iLO interfaces
 Data theft/destruction in HPC environments

“Client-side authorization checks are security theater without server validation,” warned the researcher who discovered the flaw. “This lets attackers hijack cluster operations as root.”

Mitigation Challenges

HPE confirmed CMU v8.2 reached end-of-life (EOL) in Q4 2024, with no planned patches. Organizations must:

  1. Network-isolate CMU servers behind firewalls
  2. Block inbound traffic to port 1099/TCP
  3. Monitor for suspicious RMI connections

This flaw continues a pattern of RMI-related vulnerabilities in Java-based management tools:

YearCVEImpact
2021CVE-2021-44228Log4Shell RCE
2023CVE-2023-34050VMware Aria RCE
2025CVE-2024-13804HPE CMU Takeover

HPC operators are urged to accelerate migration to supported cluster managers and audit legacy CMU deployments immediately.

As one enterprise CISO noted: “Critical infrastructure tools hitting EOL without upgrade paths create ticking time bombs.”

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!


Source link