<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: iLO 4 Ripple20 in Server Management - Remote Server Management</title>
    <link>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097366#M8780</link>
    <description>&lt;P&gt;I reached out to HPE Support who sent me to HPE Cyber Security who sent me to the HPE Product Security Response Team.&amp;nbsp; They reported the following:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;HPE product engineering teams are still in the process of evaluating Ripple20 product impacts, and implementing and testing patches for impacted products. HPE will not disclose impacted products until patches are available for them. HPE PSRT will issue or revise security bulletins and update the &lt;A href="https://techhub.hpe.com/eginfolib/securityalerts/Ripple20/Ripple20.html" target="_blank" rel="noopener"&gt;Security Vulnerability Alerts&lt;/A&gt; Ripple20 web page for impacted products when those patches become available.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It looks like it may be impacted, but HPE hasn't released a fix for it so they won't confirm it.&amp;nbsp; If you look more into the Nessus scan results, you will see that it's only reporting that the Treck stack was found on that device, but not that it was vulnerable.&amp;nbsp; Tenable has a &lt;A href="https://www.tenable.com/blog/cve-2020-11896-cve-2020-11897-cve-2020-11901-ripple20-zero-day-vulnerabilities-in-treck-tcpip" target="_blank" rel="noopener"&gt;blog post online&lt;/A&gt; that they will be releasing plugins for the individual vulnerabilities as they develop them.&amp;nbsp; You can see the list of vulnerabilities using &lt;A href="https://www.tenable.com/plugins/search?q=cves%3A(%22CVE-2020-11896%22%20OR%20%20%22CVE-2020-11898%22%20OR%20%20%22CVE-2020-11901%22%20OR%20%20%22CVE-2020-11898%22%20OR%20%20%22CVE-2020-11900%22%20OR%20%20%22CVE-2020-11902%22%20OR%20%20%22CVE-2020-11904%22%20OR%20%20%22CVE-2020-11899%22%20OR%20%20%22CVE-2020-11903%22%20OR%20%20%22CVE-2020-11905%22%20OR%20%20%22CVE-2020-11906%22%20OR%20%20%22CVE-2020-11907%22%20OR%20%20%22CVE-2020-11909%22%20OR%20%20%22CVE-2020-11910%22%20OR%20%20%22CVE-2020-11911%22%20OR%20%20%22CVE-2020-11912%22%20OR%20%20%22CVE-2020-11913%22%20OR%20%20%22CVE-2020-11914%22%20OR%20%20%22CVE-2020-11908%22)&amp;amp;sort=&amp;amp;page=1" target="_blank" rel="noopener"&gt;this plugin search&lt;/A&gt;.&amp;nbsp; Right now, only 137702 is shown which just detects the stack, but the others should show up over time.&lt;/P&gt;</description>
    <pubDate>Wed, 05 Aug 2020 23:25:49 GMT</pubDate>
    <dc:creator>rwagenmann</dc:creator>
    <dc:date>2020-08-05T23:25:49Z</dc:date>
    <item>
      <title>iLO 4 Ripple20</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097303#M8778</link>
      <description>&lt;P&gt;Currently HP lists iLO 2 and 5 on this Ripple20 page but iLO 4 is not listed. is HP developing a patch for Ripple 20 for iLO 4 devices. (HP Gen 8 and Gen9 servers in our case)&lt;/P&gt;&lt;P&gt;&lt;A href="https://techhub.hpe.com/eginfolib/securityalerts/Ripple20/Ripple20.html" target="_blank"&gt;https://techhub.hpe.com/eginfolib/securityalerts/Ripple20/Ripple20.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 11:03:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097303#M8778</guid>
      <dc:creator>shenanigans</dc:creator>
      <dc:date>2020-08-05T11:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: iLO 4 Ripple20</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097337#M8779</link>
      <description>&lt;P&gt;Our team was wondering this as well.&amp;nbsp; We have a bunch of iLo 3 and 4's showing up on our vulnerability reports, yet on the page you sent, they are not listed.&amp;nbsp; Does anyone know if HPE is working on updating these versions of iLo as well ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 17:18:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097337#M8779</guid>
      <dc:creator>MissionCritical</dc:creator>
      <dc:date>2020-08-05T17:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: iLO 4 Ripple20</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097366#M8780</link>
      <description>&lt;P&gt;I reached out to HPE Support who sent me to HPE Cyber Security who sent me to the HPE Product Security Response Team.&amp;nbsp; They reported the following:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;HPE product engineering teams are still in the process of evaluating Ripple20 product impacts, and implementing and testing patches for impacted products. HPE will not disclose impacted products until patches are available for them. HPE PSRT will issue or revise security bulletins and update the &lt;A href="https://techhub.hpe.com/eginfolib/securityalerts/Ripple20/Ripple20.html" target="_blank" rel="noopener"&gt;Security Vulnerability Alerts&lt;/A&gt; Ripple20 web page for impacted products when those patches become available.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It looks like it may be impacted, but HPE hasn't released a fix for it so they won't confirm it.&amp;nbsp; If you look more into the Nessus scan results, you will see that it's only reporting that the Treck stack was found on that device, but not that it was vulnerable.&amp;nbsp; Tenable has a &lt;A href="https://www.tenable.com/blog/cve-2020-11896-cve-2020-11897-cve-2020-11901-ripple20-zero-day-vulnerabilities-in-treck-tcpip" target="_blank" rel="noopener"&gt;blog post online&lt;/A&gt; that they will be releasing plugins for the individual vulnerabilities as they develop them.&amp;nbsp; You can see the list of vulnerabilities using &lt;A href="https://www.tenable.com/plugins/search?q=cves%3A(%22CVE-2020-11896%22%20OR%20%20%22CVE-2020-11898%22%20OR%20%20%22CVE-2020-11901%22%20OR%20%20%22CVE-2020-11898%22%20OR%20%20%22CVE-2020-11900%22%20OR%20%20%22CVE-2020-11902%22%20OR%20%20%22CVE-2020-11904%22%20OR%20%20%22CVE-2020-11899%22%20OR%20%20%22CVE-2020-11903%22%20OR%20%20%22CVE-2020-11905%22%20OR%20%20%22CVE-2020-11906%22%20OR%20%20%22CVE-2020-11907%22%20OR%20%20%22CVE-2020-11909%22%20OR%20%20%22CVE-2020-11910%22%20OR%20%20%22CVE-2020-11911%22%20OR%20%20%22CVE-2020-11912%22%20OR%20%20%22CVE-2020-11913%22%20OR%20%20%22CVE-2020-11914%22%20OR%20%20%22CVE-2020-11908%22)&amp;amp;sort=&amp;amp;page=1" target="_blank" rel="noopener"&gt;this plugin search&lt;/A&gt;.&amp;nbsp; Right now, only 137702 is shown which just detects the stack, but the others should show up over time.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 23:25:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097366#M8780</guid>
      <dc:creator>rwagenmann</dc:creator>
      <dc:date>2020-08-05T23:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: iLO 4 Ripple20</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097367#M8781</link>
      <description>&lt;P&gt;thank you for reaching out to support on our behalf. we will be watching the page for sure.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 23:35:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097367#M8781</guid>
      <dc:creator>shenanigans</dc:creator>
      <dc:date>2020-08-05T23:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: iLO 4 Ripple20</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097425#M8782</link>
      <description>&lt;P&gt;Hello sir,&lt;/P&gt;&lt;P&gt;iLO 4 security feature Ripple20 is need to modify with firmware or write a protactive feature.&lt;/P&gt;&lt;P&gt;furtht to get the support on the ILO 4 ecureity fueature, kindly reach to HPE security support team.&lt;/P&gt;&lt;P&gt;HPE Integrated Lights Out (iLO 4) - Document List&lt;/P&gt;&lt;P&gt;&lt;A href="https://internal.support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;amp;docId=a00043732en_us" target="_blank"&gt;https://internal.support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;amp;docId=a00043732en_us&lt;/A&gt;&lt;/P&gt;&lt;P&gt;HPE PRODUCT SECURITY PRACTICES&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.hpe.com/in/en/services/security-vulnerability.html" target="_blank"&gt;https://www.hpe.com/in/en/services/security-vulnerability.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Ravi swamy&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 09:27:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097425#M8782</guid>
      <dc:creator>Ravi2019</dc:creator>
      <dc:date>2020-08-06T09:27:37Z</dc:date>
    </item>
    <item>
      <title>Re: iLO 4 Ripple20</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097466#M8783</link>
      <description>&lt;P&gt;Ravi2019,&lt;/P&gt;&lt;P&gt;I contacted HPE support and no firmware or confirmation of the vulnerability is available.&amp;nbsp; They did confirm they are still reviewing some products and won't make any statements until a patch is available. The latest ILO 4 firmware is 4.73 which was released before the Ripple20 vulnerabilities were publicized.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 14:49:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097466#M8783</guid>
      <dc:creator>rwagenmann</dc:creator>
      <dc:date>2020-08-06T14:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: iLO 4 Ripple20</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097606#M8784</link>
      <description>&lt;P&gt;Hello Sir,&lt;/P&gt;&lt;P&gt;thanks for your update.&lt;/P&gt;&lt;P&gt;As the iLO security feature is not available, further to isolate and fix the security feature what I suggest log a support case with HPE.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ravi swamy&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 17:04:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097606#M8784</guid>
      <dc:creator>Raviswamy</dc:creator>
      <dc:date>2020-08-07T17:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: iLO 4 Ripple20</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097905#M8786</link>
      <description>&lt;P&gt;Raviswamy,&lt;/P&gt;&lt;P&gt;As stated in my last reply, I did submit a support case. They said what I included in my replay to&amp;nbsp;shenanigans above.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 15:09:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7097905#M8786</guid>
      <dc:creator>rwagenmann</dc:creator>
      <dc:date>2020-08-11T15:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: iLO 4 Ripple20</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7098607#M8794</link>
      <description>&lt;P&gt;The HPE Product Security Team just notified me that HPE has confirmed the vulnerability with ILO 4 and released firmware 2.75 to fix it.&amp;nbsp; You can download the latest firmware from the &lt;A href="https://support.hpe.com/hpsc/swd/public/detail?swItemId=MTX_ab5df8004f2e4af3920c4cd163" target="_blank" rel="noopener"&gt;HPE Support Center&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2020 21:23:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/ilo-4-ripple20/m-p/7098607#M8794</guid>
      <dc:creator>rwagenmann</dc:creator>
      <dc:date>2020-08-18T21:23:33Z</dc:date>
    </item>
  </channel>
</rss>

