Print | Rate this content

HPESB3P03762 rev.1 - HPE C Switch Software using Cisco Prime Data Center Network Manager (DCNM), Remote Code Execution


Document ID: hpesb3p03762en_us

Version: 1

HPESB3P03762 rev.1 - HPE C Switch Software using Cisco Prime Data Center Network Manager (DCNM), Remote Code Execution
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2017-08-11

Last Updated: 2017-08-10

Potential Security Impact: Remote: Code Execution

Source: Hewlett Packard Enterprise, HPE Product Security Response Team


HPE StoreFabric C-series Switch Software uses Cisco’s Prime Data Center Network Manager (DCNM). Cisco has identified a remote code execution vulnerability in two versions of Cisco Prime Data Center Network Manager (DCNM) which HPE had included for download for customers under contract from the HPE Support Center. The affected versions of DCNM are 10.1(1) and 10.1(2). HPE bundled these DCNM versions with the following MDS and Nexus firmware downloads:

  • MDS 7.3(0)DY(1), released February 2017
  • MDS 7.3(1)DY(1), released April 2017
  • Nexus 5.2(1)N1(9b), released May 2017

Note: A vulnerability in the role-based access control (RBAC) functionality of Cisco Prime Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to access sensitive information or execute arbitrary code with root privileges on an affected system. The vulnerability is due to the lack of authentication and authorization mechanisms for a debugging tool that was inadvertently enabled in the affected software. An attacker could exploit this vulnerability by remotely connecting to the debugging tool via TCP. A successful exploit could allow the attacker to access sensitive information about the affected software or execute arbitrary code with root privileges on the affected system.

References: CVE-2017-6639

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP C-series Switch Software Data Center Network Manager Version 10.1(1), 10.1(2)


CVSS Version 3.0 and Version 2.0 Base Metrics
V3 Vector
V3 Base Score
V2 Vector
V2 Base Score
Information on CVSS is documented in HPE Customer Notice: HPSN-2008-002


There are no workarounds that address this vulnerability. Cisco has released software updates that address this vulnerability with DCNM 10.2(1). HPE has made the updates available to customers under contract through HPE Support Center:

It is essential that all HPE customers who had previously downloaded any of the firmware and DCNM packages above download again with the updated packages from the HPE Support Center. All packages have been updated to include DCNM 10.2(1), and they are listed here:

  • MDS 7.3(0)DY(1), released June 2017
  • MDS 7.3(1)DY(1), released June 2017
  • Nexus 5.2(1)N1(9b), released June 2017

Version:1 (rev.1) - 10 August 2017 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to

Report: To report a potential security vulnerability for any HPE supported product:

Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email:

Security Bulletin Archive: A list of recently released Security Bulletins is available here:

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software

©Copyright 2018 Hewlett Packard Enterprise Development LP
Hewlett Packard Enterprise Development shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HPE nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise Development and the names of Hewlett Packard Enterprise Development products referenced herein are trademarks of Hewlett Packard Enterprise Development in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.

Provide feedback

Please rate the information on this page to help us improve our content. Thank you!
Document title: HPESB3P03762 rev.1 - HPE C Switch Software using Cisco Prime Data Center Network Manager (DCNM), Remote Code Execution
Document ID: emr_na-hpesb3p03762en_us-1
How helpful was this document?
How can we improve this document?
Note: Only English language comments can be accepted at this time.
Please wait while we process your request.