Tuesday, July 23, 2024

Fixing “SSLv3.0/TLSv1.0 Protocol Weak CBC Mode Vulnerability” in HP System Management Homepage

Abstract: If you scan your fresh new HP Server via a vulnerability scan (e.g Nessus) you might get a “58751 – SSL/TLS Protocol Initialization Vector Implementation Information Disclosure Vulnerability” on Port 2381 but how to fix it?

Warning: This solution is outdated, check the new one here including the reason.

Solution: The message above is in correlation to the vulnerability CVE-2011-3389 and is called “BEAST attack” if you search for in the Internet. It is a “SSLv3.0/TLSv1.0 Protocol Weak CBC Mode Vulnerability” and to fix that in the HP System Management on the affected server you need to disable “block ciphers”. This can be done via the following command on the affected Server:

C:\hp\hpsmh\bin\smhconfig.exe -Z 'RC4-SHA'

Like mentioned in the HP Documentation HPSBMU02742 SSRT100740 here.

After that you need to restart the “System Management Homepage”.

If you got a error message like “Input is not proper UTF-8, indicate encoding!” you need to check the mentioned XML which is normally C:/hp/hpsmh/conf/smhpd.xml. It could be that you used the wrong apostrophe in the command above which is now in the xml file. You can fix that with Notepad directly on the server if needed.


Related Articles


Please enter your comment!
Please enter your name here

Stay Connected

- Advertisement -

Latest Articles