Hacker News new | past | comments | ask | show | jobs | submit login
Hidden admin user on every HP MSA2000 G3 (seclists.org)
100 points by Garbage on Dec 14, 2010 | hide | past | favorite | 26 comments



I can just see it now...

  - A hidden admin account is perfect for debugging and support!
  - What if someone guesses the password?
  - Nah, who the hell is gonna guess THAT?!


the exclamation at the beginning would throw off most script kiddies seriously. Who puts an exclamation point at the beginning?


Someone who's really, really excited about their new admin account.


It's to fight robots. I am admin. I am !admin.


For those that don't know, an HP MSA2000 is a baby SAN - a small business storage array.

There's not a lot of info in that post, and I don't see any other posts in the thread. This is an issue if it can be accessed remotely, but not a big deal if it requires a console cable.

Even if it CAN be accessed remotely, it shouldn't be as big an issue as you'd think. SANs are usually not connected to the Internet and the management ports should be set on separate management VLANs. The number of SAN installs I've seen where the SAN engineer installing it left the passwords at the default and the customer never changed them is mind-boggling, anyway.

Not to take away from the importance of something like this, but it's not as severe as say, a remote-root exploit in Linux.


If this is for real then it's flabbergasting.



Pretty serious, considering that these devices can do iSCSI - meaning any machine with access to it over the LAN, such as any machine that is getting some iSCSI storage from the device, can now do nefarious things.


I don't know about others, but we put all our iSCSI stuff on a physically disparate network, separate NICs, separate switches.

Doesn't help if someone has physical access to the datacenter, but that's a given.


Would it not be the case, that a compromised machine that was mounting iSCSI, might then be able to access the hidden admin feature? It could then mount other volumes read-only and read data meant to be private...


Not necessarily. In most cases administration access to these things are on an entirely separate network from connection protocol. Having an iSCSI / nfs connection isn't enough; you'd also have to be on the same network as the management interface.


Does anyone know what a HP MSA2000 G3 is? Google vaguely hints that it could be a laptop.


Googling it suggests that it's a SAN (Storage Area Network) device. Which is like an industrial-scale hard disk system.

http://h71016.www7.hp.com/dstore/ctoBases.asp?ProductLineId=...


Think of it as just a big disk enclosure. You can either plug it into the back of an HP server or plonk it on the network by itself.

Google has some good pictures: http://www.google.com/images?q=HP%20MSA%203000

HP's high-end 'ProLiant' kit have "Integrated Lights-out" that will allow you to do things like power cycle the device, drop on to the serial console, etc. All over a user friendly web interface.

I'm assuming this 'admin backdoor' it is for that.


A laptop?! This is the first result on google: http://h10010.www1.hp.com/wwpc/us/en/sm/WF04a/12169-304616-2...


A laptop for VERY strong people with huge storage needs ;)



It's a SAN device with a ton of drive bays. We've got a few and they seem pretty speedy, haven't had an issue with them. I'm already investigating what generation we have - but I'm almost certain our initial setup on at least one was using the admin !admin credentials, which means that it's documented _somewhere_.


Just had a quick look through some of the setup docs, and I can find "manage / !manage" as a given, but not admin / !admin (yet).


First paragraph, first sentence of the article: "every HP MSA2000 G3 SAN".

(Though it looks to be a P2000 MSA G3).


FreeNAS solves all these hidden vendor problems.


I'm not sure it solves our fibre channel needs...


NAS != SAN


Has anyone confirmed this in the wild?


It works on one I have, the interesting thing will be see if it works on other recent MSA arrays as well.


Is this hacker news or hacker leaks? everybody run.....




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: