- Community Home
- >
- Software
- >
- HPE OneView
- >
- Terrapin vulnerability on c7000 virtual connects m...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-07-2024 03:11 AM - last edited on 02-07-2024 08:07 PM by support_s
02-07-2024 03:11 AM - last edited on 02-07-2024 08:07 PM by support_s
Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
Hi,
We've managed to disable CBC-EtM support on Virtual Connects that are not managed by HPE OneView using:
set ssh -quiet CBC-cipher=Disabled
Virtual Connects managed by HPE OneView are not accessible though ssh and therefore we cannot disable this cipher.
How to either access VC over SSH or disable it from HPE OneView?
- Tags:
- Virtual Connect
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-07-2024 08:50 AM
02-07-2024 08:50 AM
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
Virtual Connect Manager is not a running service when the enclosure is managed by OneView. There is no ability to disable specific ciphers on the Ethernet modules private API interfaces.
[Any personal opinions expressed are mine, and not official statements on behalf of Hewlett Packard Enterprise]

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-07-2024 11:45 AM - last edited on 02-07-2024 08:06 PM by Sunitha_Mod
02-07-2024 11:45 AM - last edited on 02-07-2024 08:06 PM by Sunitha_Mod
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
Hi Chris,
Issue is that SSH is enabled on VC even when VCM is disabled.
SSH gets flagged as vulnerable to Terrapin in our environment.
Any idea what can be done about it?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-07-2024 08:09 PM - edited 02-07-2024 08:10 PM
02-07-2024 08:09 PM - edited 02-07-2024 08:10 PM
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
SSH is only present to transfer firmware images during the module firmware update process. Otherwise, it is not customer accessible. Nothing further can be done here.
[Any personal opinions expressed are mine, and not official statements on behalf of Hewlett Packard Enterprise]

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-08-2024 02:26 AM - last edited on 02-08-2024 06:01 AM by Sunitha_Mod
02-08-2024 02:26 AM - last edited on 02-08-2024 06:01 AM by Sunitha_Mod
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
Hi @ChrisLynch ,
SSH is only present to transfer firmware images during the module firmware update process.
Looks like it's not true. SSH is enabled 100% of the time.
Vulnerable VC
[Moderator edit: Erased the confidential info.]
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-08-2024 07:10 AM - edited 02-08-2024 07:10 AM
02-08-2024 07:10 AM - edited 02-08-2024 07:10 AM
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
I didn't say that SSH would be started "on-demand" or the daemon would only start for firmware updates. SSH is only used for SCP to transfer firmware updates to the VC modules. However, no customer can access that interface.
[Any personal opinions expressed are mine, and not official statements on behalf of Hewlett Packard Enterprise]

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-10-2024 08:02 AM - edited 07-10-2024 08:03 AM
07-10-2024 08:02 AM - edited 07-10-2024 08:03 AM
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
Hi Chris,
On our environment SSH is contantly running on virtual connects.
How do we get access to virtual connect when it's managed by HPE OneView?
How to get password for vcmadm_?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-10-2024 08:32 AM
07-10-2024 08:32 AM
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
As I stated previously, there is no way to disable SSH on Virtual Connect modules even managed by OneView. SSH here is strictly used to transfer firmware updates for the VC modules only. We do not expose a general purpose SSH interface anyhow.
[Any personal opinions expressed are mine, and not official statements on behalf of Hewlett Packard Enterprise]

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-10-2024 08:41 AM
07-10-2024 08:41 AM
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
Our security team seams to not understand this argument.
I do not want to disable SSH on Virtual Connect - I want to get in and disable cipher that is vulnerable.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-10-2024 08:49 AM
07-10-2024 08:49 AM
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
Does the security team understand his previous response:
"Virtual Connect Manager is not a running service when the enclosure is managed by OneView. There is no ability to disable specific ciphers on the Ethernet modules private API interfaces."
I work at HPE
HPE Support Center offers support for your HPE services and products when and how you need it. Get started with HPE Support Center today.
[Any personal opinions expressed are mine, and not official statements on behalf of Hewlett Packard Enterprise]

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-10-2024 10:14 AM
07-10-2024 10:14 AM
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
Given this situation, I kindly request that you reach out to our software engineers. Could you ask them to explore potential workarounds? It seems that HPE OneView is somehow authenticating with Virtual Connect, and if we could obtain the password, it might help resolve our problem.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-10-2024 10:23 AM
07-10-2024 10:23 AM
Re: Terrapin vulnerability on c7000 virtual connects managed by HPE OneView
You're not getting the message. There is no password. There is no command line. There is no feature in the private API that OneView is using to disable specific cyphers.
I work at HPE
HPE Support Center offers support for your HPE services and products when and how you need it. Get started with HPE Support Center today.
[Any personal opinions expressed are mine, and not official statements on behalf of Hewlett Packard Enterprise]
