Remote Code Execution and Authentication Bypass Vulnerabilities in HPE iLO 2 Firmware

Remote Code Execution and Authentication Bypass Vulnerabilities in HPE iLO 2 Firmware

CVE-2017-8979 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

Security vulnerabilities in the HPE Integrated Lights-Out 2 (iLO 2) firmware could be exploited remotely to allow authentication bypass, code execution, and denial of service.

Learn more about our Web Application Penetration Testing UK.