Monday, April 28, 2025
HomeCVE/vulnerabilityHPE IceWall Flaw Let Attackers cause Unauthorized Data Modification

HPE IceWall Flaw Let Attackers cause Unauthorized Data Modification

Published on

SIEM as a Service

Follow Us on Google News

Hewlett Packard Enterprise (HPE) has issued an urgent security bulletin addressing a critical vulnerability in its IceWall product line.

Identified as CVE-2024-11856, this flaw could allow attackers to remotely modify data without authorization.

This flaw is capable of enabling unauthorized data modification from remote locations, posing a significant security threat to the affected systems.

- Advertisement - Google News

Vulnerability Summary

The issue at the core of CVE-2024-11856 lies in the IceWall modules’ ability to improperly manage failed password attempts.

This defect allows users to surpass the intended limit for unsuccessful login attempts, thereby gaining potential access to modify data without proper authorization.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

The affected IceWall modules include:

  • IceWall Gen11 certd for RHEL 7, RHEL 8, and RHEL 9
  • IceWall Gen11 certd for Windows
  • IceWall SSO 10.0 certd for HP-UX

Supported Software Versions

Only the following versions are impacted:

  • IceWall Gen11 Enterprise Edition certd (RHEL 7, 8, 9, and Windows)
  • IceWall Gen11 Standard Edition certd (RHEL 7, 8, 9, and Windows)
  • IceWall SSO certd 10.0 (HP-UX)

According to HPE, the vulnerability has been assigned a CVSS v3.1 base score of 3.7, indicating a medium impact.

The vector is described as remote, with no requirement for physical access or user interaction, making it particularly concerning for enterprise environments that rely on IceWall for secure authentication.

HPE has released updated patches to mitigate this vulnerability. Users are urged to apply these patches immediately to ensure the security of their systems. The available patches include:

  • IceWall Gen11 certd Patch Release 14 for RHEL 7, 8, and 9
  • IceWall Gen11 certd Patch Release 14 for Windows
  • IceWall SSO 10.0 certd Patch Release 10 for HP-UX

For assistance in implementing these security measures, users are advised to contact HPE Services support.

Organizations using affected HPE IceWall products should prioritize the application of these patches to safeguard against potential unauthorized data modifications.

Analyse Advanced Malware & Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...