HP hardware vulnerable to ShellShock bug?

Hi all,
I have been asked to check whether our HP hardware is affected in any way by the recent Bash vulnerability.
We use the following HP hardware:
E-MSM460 Access Point (ww)(J9591a) - Wireless Access Point
ProCurve 2520G-24-POE (J9299A) - POE Switch
ProCurve Switch 2510G-24 (J9279A) - Switch
Can anyone advise whether these devices use any type of Linux or OSX based software?
Many thanks,
James.

Hi,
Please post your question on Business Support forum. HP rep at your country should tell you. I know we have many HP products in our halls (ie computer rooms) but I only talk with other vendors, not HP.
Regards.
BH
**Click the KUDOS thumb up on the left to say 'Thanks'**
Make it easier for other people to find solutions by marking a Reply 'Accept as Solution' if it solves your problem.

Similar Messages

  • Both my MacMini and MacBook Air appear to be vulnerable to the shellshock bug. When will a patch be released?

    Both my MacMini and Macbook Air appear to be vulnerable to the Shellshock bug. When will a patch be released?

    Read http://arstechnica.com/apple/2014/09/apple-patches-shellshock-bash-bug-in-os-x-1 0-9-10-8-and-10-7/

  • Is the IX2 with firmware 3.2.X vulnerable to the Shellshock bug?

    Is the IX2 with firmware 3.2.X vulnerable to the Shellshock bug?

    An update was just released addressing this issue.
    LenovoEMC has released an updated version of LifeLine that incorporates fixes for the Shellshock issues. These fixes improve environment variable parsing in Bash and reset the Bash parser state. This update also includes other security updates and fixes.
    Linux Shellshock vulnerability

  • Shellshock bug

    Is no one curious about whether Apple is working on this?

    If the issue concerns an older vintage obsolete Mac OS X and a former security
    issue, bypassed through upgrade and updates over many years, I'd guess No.
    However there is a new issue that re-uses an old name bug... of different nature.
    I see this page, but wonder about its validity: (consumes resources to view)
    http://www.imore.com/about-bash-shellshock-vulnerability-and-what-it-means-os-x
    A new installation on a wiped hard drive would be a way to remove it from Mac.
    Please define the system and hardware this issue is confined to; if you have it.
    •What does the Shellshock bug affect?
    http://www.thesafemac.com/?s=shellshock&submit=Search
    http://www.thesafemac.com/what-does-the-shellshock-bug-affect/#more-1688
    While I have Leopard on a few machines, I try to not install software from odd
    places that are suspect. See if TheSafeMac has anything about it; email the
    author of the site and ask him. http://www.thesafemac.com/tech-guides/
    Good luck & happy computing!
    edited

  • Reg Nexus 5000 + 7000 software (Shellshock -bug )

    Hi people.
    Regarding this bug : Shellshock . What is the recomended software upgrade for Nexus 5000 & 7000.
    It is important that the VPC and FCoE is still working, after an upgrade.
    Need recommendation for following devices :
    Nexus 5000
    https://tools.cisco.com/bugsearch/bug/CSCur05017
    All current versions of NX-OS on this platform are affected unless 
    otherwise stated.. This bug will be updated with detailed affected and 
    fixed software versions once fixed software is available.
    Exposure is not configuration dependent.
    Authentication is required to exploit this vulnerability. 
    Nexus 7000
    https://tools.cisco.com/bugsearch/bug/CSCuq98748
    All current versions of NX-OS on this platform are affected unless 
    otherwise stated
    Exposure is not configuration dependent.
    Authentication is required to exploit this vulnerability.
    This bug is fixed in NX-OS versions specified below:
    5.2(9a)
    6.1(5a)
    6.2(8b)
    6.2(10) and above
    Is there anyone that has some information on this ?
    Many thanx in advance,

    Hello.
    Let me look into this for you. Do you have an existing support contract or SmartNet for these Nexus 5000 and 7000 switches, by the way?
    Let me know if you have other concerns as well or e-mail ([email protected]) me directly. 
    Kind regards. 

  • ISA500 series and Shellshock bug

    Hello,
    Would the shellshock bug be corrected with a new firmware for the ISA500 series?
    It would be nice even the support end in November 14.
    And to correct the VPN issue at the same time. It's boring to reboot the device each 2-3 weeks while all tunnel fails.

    Hi,
    For up-to-date information on products affected by 'Shellshock', please see the official Security Advisory at the following link:
    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
    Please note the ISA500 is listed under 'Products Confirmed Not Vulnerable'. 
    Thanks,
    Brandon

  • 1921 integrated services router possibly affected by ShellShock bug?

    Hi all,
    Can anyone advise if this device runs Linux or OSX based software?
    1900 series (1921) integrated services router
    I have been asked to check if this hardware is possibly at risk from the shellshock bug.
    Many thanks,
    James

    Hello:
    please see the following link, it may answer you questions
    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
    Carlos

  • IMac is vulnerable to Shellshock

    Hi,
    My iMac has is vulnerable to Shellshock.  See test and results below.  Please advise.
    Test:
    Is my machine vulnerable?
    Shellshocker.net provides two tests, one for each vulnerability, (CVE-2014-6271) and (CVE-2014-7169). On a Mac, open the Terminal program and type:
    env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
    If you see "vulnerable" echoed in the response, your version of Bash is affected. Then type:
    env X='() { (a)=>\' bash -c "echo date"; cat echo
    If you see today's date (alongside any errors), your version of Bash is vulnerable.
    Results:
    Last login: Sun Sep 28 11:30:39 on console
    Daryls-iMac-2:~ darylkennedy$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
    vulnerable
    this is a test
    Daryls-iMac-2:~ darylkennedy$
    Daryls-iMac-2:~ darylkennedy$ env X='() { (a)=>\' bash -c "echo date"; cat echo
    bash: X: line 1: syntax error near unexpected token `='
    bash: X: line 1: `'
    bash: error importing function definition for `X'
    Sun Sep 28 11:36:27 EDT 2014
    Daryls-iMac-2:~ darylkennedy$

    d-nc wrote:
    Hi,
    My iMac has is vulnerable to Shellshock.  See test and results below.  Please advise.
    Don't run a web server and don't allow remote access. But, I imagine that is true already.
    Unless you are using an Airport Extreme, your router is likely the biggest vulnerability. The others are generally configured through a web server.
    See the other posts Esquared linked.

  • Is ESX v3.0 / 3.5 vulnerable to Shellshock?

    Greetings,
    Is ESX v3.0 / 3.5 vulnerable to Shellshock? - I have searched all over and cannot find this answer. I tried finding out the linux shell version as well, but did not locate that. I thought Google would answer this in 2 minutes
    Any help is appreciated.
    Thanks,
    Rick

    It should be as ESX 4 is vulnerable as well, with the difference being there is a patch available for ESX 4. I think the recommendation would be to upgrade to atleast ver 4 and apply the patch.
    Security advisory located at
    VMSA-2014-0010.4 | United States
    Regards
    Girish

  • How to protect OSX against Shellshock bug?

    Is there a patch out already to protect against the just discovered Shellshock bug (which exploits bash)?

    Per Linc Davis, a user here who knows more about Unix than pretty much anyone else here:
    The issue only affects users who run a public server.
    From your post:
    my airport extreme just got hacked
    And what does your router have to do with the issue? Router poisoning has been known to exist for a long time, which has absolutely nothing to do with Bash, or your Mac. It's a problem with routers being shipped with remote management enabled in its settings. Reset the router, then go into the settings and disable remote access.

  • Media Hub vulnerability to Bash bug (Shellshocked)

    For those of us who haven't bother to root their Cisco/Linksys NMHxxx Media Hubs, is there any cause for concern regarding the recently announced Bourne Again Shell (Bash) bug / Shell Shocked vulnerability?
    Thanks in advance to anyone from the community who can provide insight.

    Typically embedded systems use BusyBox shell which isn't effected.
    Please remember to Kudo those that help you.
    Linksys
    Communities Technical Support

  • How can I tell that it is a hardware issue or ios bug issue with Iphone 4S Battery life & flapping 3G?

    Hi There,
    My Battery dies real quick on 4S compared to 4 eventhough my wireless is off, location services are off, the only thing on is the cellular data. I even adjusted the brightness to 60%.
    Another issue is that My 3G connection keeps flapping, goes & comes in a wierd way where it falls back to Edge.
    Am I to consider this part of the issues i can see so many people facing & therefore consider as ios bug & wait for the update or should I take it over to a service center to check the phone for me which means waste of time to get it done.
    Kindly advise from your experience

    It's almost always a software issue. Actual hardware problems are rare but can get very serious, if you recall the antenna issue last year.
    Reception problems just depend on how strong the signals are at your location. But if you're dropping to Edge even in strong areas, it wouldn't hurt to have an apple store look at it.

  • ISE 1.2.0.899 vulnerable to Shellshock?

    Hi, I just saw that version 1.2(0.747) is vulnerable. How about 1.2.0.899?
    https://tools.cisco.com/bugsearch/bug/CSCur00532
    KR

    I've asked the PSIRT Team and they confirmed that ISE is vulnerable.
    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
    (Prime Infrastructure is vulnerable as well but is not yet mentioned in the advisory.  It will be added in an upcoming revision.)

  • Hardware or software power bug?

    I have a Mid 2005 iBook G4 1.33 running 10.4.5. When I have the screen brightness lowered while running on AC then unplug the cord, then plug it back in, it sets the brightness to max. If I use the brightness controls it immediately returns to the dimmed setting. This happens no matter what settings I have in Energy Saver. Has anyone else seen this bug? I dunno if it's hardware or software related.

    do you have the option on in system preferences to dim display when no power supply is present???

  • Does IPS SSM affected by the Shellshock bug?

    Anybody knows if the independent IPS appliance is only affected or also the IPS SSM installed on a cisco ASA are vulnerable?
    Thanks

    According to this, yes its vulnerable:
    https://tools.cisco.com/bugsearch/bug/CSCur00552

Maybe you are looking for

  • Part 1 entries for RG23A not printed in registers

    Dear Gurus, After capturing the excise invoice without refernce to the purchase order form transfer from stotage location to storage location excise Invoice we posted. RG23A PART1 and RG23A PART2 Resisters are extracted using J2I5 and Printed using Z

  • Electronic forms

    Our company does document imaging, meaning we scan paper and help companies go paperless. One area in which we'd like to move is the area which helps companies stay paperless. We'd like to provide the service of creating forms that can be filled out

  • SCCM Windows 7 Collection Query 32 bit

    I'm trying to get 32-bit Windows 7 collection on SCCM 2007. Here is my query: select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from

  • SLT refresh/system copy

    Hi, We would be going for a SLT refersh from production to Acceptance. Please do share any documents related to this. Thanks, Rajiv

  • CA stops Internal domain names for certificates

    I have got this information from digicert http://www.digicert.com/internal-names.htm  is there any way to ensure all clients works properly. Should we have to change our internal domain names to external ones, this will be a problem and visible. It g