SUPPORT COMMUNICATION- SECURITY BULLETIN HPSBHF03310 rev.2 - HP Thin Clients running Windows Embedded Standard 7 (WES7) or Windows Embedded Standard 2009 (WES09) with HP Easy Deploy, Remote Elevation of Privilege, Execution of Code

Related Vulnerabilities: CVE-2015-2112   CVE-2015-2113  

Potential security vulnerabilities have been identified with certain HP Thin Clients running Windows Embedded Standard 7 (WES7) and Windows Embedded Standard 2009 (WES09) and all versions of HP Easy Deploy. The vulnerabilities could be exploited remotely to allow elevation of privilege and execution of code. Note: HP Easy Deploy was bundled in versions of HP Easy Tools prior to version 3.0.1.1650.

Potential Security Impact:
Remote elevation of privilege, execution of code

VULNERABILITY SUMMARY

Potential security vulnerabilities have been identified with certain HP Thin Clients running Windows Embedded Standard 7 (WES7) and Windows Embedded Standard 2009 (WES09) and all versions of HP Easy Deploy. The vulnerabilities could be exploited remotely to allow elevation of privilege and execution of code.
Note: HP Easy Deploy was bundled in versions of HP Easy Tools prior to version 3.0.1.1650.
Reference Number
  • CVE-2015-2112
  • CVE-2015-2113
  • SSRT101680
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Note: All versions of Easy Deploy running on Windows Embedded Standard 7 (WES7) Easy Deploy are vulnerable.
Following is a complete list of affected hardware platforms.
Hardware Platforms Affected:
  • HP t5540 Thin Client
  • HP t5740 Thin Client
  • HP t5740e Thin Client
  • HP t510 Flexible Thin Client
  • HP t520 Flexible Thin Client
  • HP t610 Flexible Thin Client
  • HP t620 Flexible Thin Client
  • HP t820 Flexible Thin Client
BACKGROUND
CVSS 2.0 Base Metrics
Reference
Base Vector
Base Score
CVE-2015-2112
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
9.0
CVE-2015-2113
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Junior Meijering for reporting this issue security-alert@hp.com.
RESOLUTION
HP has removed HP Easy Deploy from the HP Easy Tools software package beginning with version 3.0.1.1650.
HP recommends updating HP Easy Tools thin client management software to at least version 3.0.1.1650 or later.
Alternatively, customers may choose to remove older versions of HP Easy Tools containing HP Easy Deploy while logged in as an Administrator by using either of the following methods:
  • Method 1: Remove HP Easy Tools from Add/Remove Program
  • Method 2: Execute the command Msiexec.exe /x{EB60CBE5-19E8-4A62-AB13-1CF5FA4F9C82}
HISTORY
Version:1 (rev.1) - 7 April 2015 Initial release
Version:2 (rev.2) - 13 April 2015 updated list of hardware platforms affected
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h40564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin.HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action.HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin.To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."