module
HP Data Protector Encrypted Communication Remote Command Execution
Disclosed | Created |
---|---|
2016-04-18 | 2018-05-30 |
Disclosed
2016-04-18
Created
2018-05-30
Description
This module exploits a well known remote code execution exploit after establishing encrypted
control communications with a Data Protector agent. This allows exploitation of Data
Protector agents that have been configured to only use encrypted control communications.
This exploit works by executing the payload with Microsoft PowerShell so will only work
against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows
Server 2008 R2.
control communications with a Data Protector agent. This allows exploitation of Data
Protector agents that have been configured to only use encrypted control communications.
This exploit works by executing the payload with Microsoft PowerShell so will only work
against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows
Server 2008 R2.
Authors
Jon Barg
Ian Lovering
Ian Lovering
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.