Remote Code Execution Vulnerability in HPE Insight Cluster Management Utility
CVE-2024-13804

9.8CRITICAL

Key Information:

Vendor
HP
Vendor
CVE Published:
30 March 2025

What is CVE-2024-13804?

CVE-2024-13804 is a vulnerability found in the HPE Insight Cluster Management Utility, a tool utilized by organizations for managing and monitoring high-performance computing (HPC) environments. This vulnerability allows unauthorized parties to execute arbitrary code remotely without authentication, posing significant risks to the integrity and security of affected systems. Organizations relying on this utility for their HPC workloads are at risk of potential operational disruptions and unauthorized data manipulation, which can have serious ramifications for their business operations.

Technical Details

CVE-2024-13804 is characterized as an unauthenticated remote code execution (RCE) vulnerability. The flaw exists within the HPE Insight Cluster Management Utility's handling of requests, enabling attackers to exploit the vulnerability without any form of authentication. Successful exploitation could allow an attacker full control over the system, leading to unauthorized actions on the server.

Potential Impact of CVE-2024-13804

  1. System Compromise: Exploitation of CVE-2024-13804 could result in complete control over the affected systems, potentially allowing attackers to manipulate data, deploy malicious software, or disrupt services.

  2. Data Breach Risk: As attackers gain unauthorized access, sensitive organizational data may be at risk, heightening the possibility of data theft or degradation, which can lead to regulatory penalties and loss of customer trust.

  3. Operational Disruption: The ability to execute arbitrary code could lead to significant operational disruptions within HPC environments, affecting performance and the availability of critical services that rely on uninterrupted operations.

Affected Version(s)

HPE Insight Cluster Management Utility (CMU) 8.2

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.