Cyber Security News

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

A critical unauthenticated remote code execution (RCE) vulnerability in HPE Insight Cluster Management Utility (CMU) v8.2 allows attackers to bypass authentication and execute commands as root on high-performance computing (HPC) clusters, researchers revealed today.

Tracked as CVE-2024-13804, the flaw exposes HPC environments to full cluster compromise through weaponized Java client applications.

Anonymous access to the application

Technical Breakdown

The vulnerability stems from insecure client-side authorization controls in CMU’s Java Web Start (JNLP) application.

Opening the jar with JD-GUI

While the GUI client initially restricts administrative functions like cluster provisioning, threat actors can:

1. Decompile Critical JAR Components

Attackers reverse-engineered the cmugui_standalone.jar file using tools like JD-GUI, exposing client-side admin checks in the AdminUserModel.java class.

2. Forge Administrative Privileges

By modifying the isAdmin validation to always return true (shown below), attackers unlock restricted functions:

// Original code

public boolean isUserAdmin() { return this.isAdmin; } 

// Weaponized version

public boolean isUserAdmin() { return true; } 

3. Exploit RMI for Root Commands

The modified client leverages CMU’s Java Remote Method Invocation (RMI) on port 1099 to call the ExecuteCmdLine method, executing OS commands via:

java -jar weaponized_cmugui.jar

PoC attacks have demonstrated ifconfig and whoami execution with root privileges on cluster management nodes.

Saving decompiled source code

Attack Impact

Successful exploitation enables:
🟥 Full cluster control via management node access
🟥 Lateral movement to integrated iLO interfaces
🟥 Data theft/destruction in HPC environments

“Client-side authorization checks are security theater without server validation,” warned the researcher who discovered the flaw. “This lets attackers hijack cluster operations as root.”

Mitigation Challenges

HPE confirmed CMU v8.2 reached end-of-life (EOL) in Q4 2024, with no planned patches. Organizations must:

  1. Network-isolate CMU servers behind firewalls
  2. Block inbound traffic to port 1099/TCP
  3. Monitor for suspicious RMI connections

This flaw continues a pattern of RMI-related vulnerabilities in Java-based management tools:

YearCVEImpact
2021CVE-2021-44228Log4Shell RCE
2023CVE-2023-34050VMware Aria RCE
2025CVE-2024-13804HPE CMU Takeover

HPC operators are urged to accelerate migration to supported cluster managers and audit legacy CMU deployments immediately.

As one enterprise CISO noted: “Critical infrastructure tools hitting EOL without upgrade paths create ticking time bombs.”

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

‘RemoteMonologue’ New Red Team Technique Exploits DCOM To Steal NTLM Credentials Remotely

A sophisticated new red team technique dubbed "RemoteMonologue" has emerged, enabling attackers to remotely harvest…

3 minutes ago

OpenSSH 10.0 Released: New Protocol Changes and Key Security Improvements

The OpenSSH team has announced the release of OpenSSH 10.0 on April 9, marking an important milestone…

20 minutes ago

PAN-OS Command Injection Flaw Lets Hackers Execute Arbitrary Code Remotely

Palo Alto Networks has disclosed a medium-severity vulnerability (CVE-2025-0127) in its PAN-OS software, enabling authenticated…

31 minutes ago

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…

10 hours ago

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting…

12 hours ago

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass…

12 hours ago