Cyber Security

HPE Critical 3PAR Processor Flaw Let Remote Attackers Bypass Authentication

Hewlett Packard Enterprise (HPE) has addressed a critical vulnerability in its 3PAR Service Processor software that could have far-reaching implications for organizations relying on HPE 3PAR StoreServ Storage systems.

The flaw, identified as CVE-2024-22442, allows remote attackers to bypass authentication mechanisms, potentially allowing unauthorized access to sensitive data and control over storage systems.

CVE-2024-22442: A Critical Vulnerability

The vulnerability, CVE-2024-22442, has been assigned a CVSS score of 9.8, categorizing it as critical. This high severity rating underscores the potential for significant exploitation if the flaw remains unpatched.

The issue arises from a security restriction bypass within the Service Processor software, pivotal in managing HPE 3PAR StoreServ Storage systems.

The Service Processor is responsible for collecting and transmitting data to HPE for monitoring and analysis, making it a crucial component in the storage infrastructure.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Potential Risks and Exploitation

This vulnerability could allow attackers to circumvent authentication measures, granting them unauthorized access to the 3PAR Service Processor. Such access could result in data breaches, unauthorized modifications, and even disruption of storage operations.

The consequences of such an attack could be dire, affecting the integrity, confidentiality, and availability of data stored within the 3PAR StoreServ systems.

HPE has been swift in its response to this critical issue. The company has released a patched version of the Service Processor software, v5.1.2, which addresses the authentication bypass vulnerability.

HPE has also acknowledged the efforts of security researcher Milad Fadavvi, who reported the issue. This highlights the importance of collaboration between tech companies and security researchers in identifying and mitigating vulnerabilities.

Urgent Call to Action for Users

Organizations utilizing HPE 3PAR StoreServ Storage systems with Service Processor software versions 5.1.1 or earlier are strongly advised to prioritize the update to version 5.1.2.

HPE has emphasized the urgency of this update, warning that failure to do so could leave their storage infrastructure vulnerable to unauthorized access and potential data compromise.

The release of the patched version v5.1.2 not only addresses the specific vulnerability but also strengthens the 3PAR Service Processor’s overall security posture.

HPE’s proactive approach in releasing this update demonstrates its commitment to ensuring the security and reliability of its storage solutions.

As cyber threats continue to evolve, the discovery and swift mitigation of vulnerabilities like CVE-2024-22442 are crucial in maintaining critical infrastructure security.

Organizations relying on HPE 3PAR StoreServ Storage systems must act promptly to apply the latest updates and safeguard their data against potential exploitation.

The collaboration between HPE and security researchers like Milad Fadavvi reminds us of the importance of vigilance and proactive measures in the ever-changing landscape of cybersecurity.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Dhivya

Divya is a Senior Journalist at Cyber Security news covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities

Along with the release of Kali Linux 2025.3, a major update introduces an innovative tool that…

2 hours ago

New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands

ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…

17 hours ago

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…

18 hours ago

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…

18 hours ago

175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…

19 hours ago

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…

20 hours ago