RULE(RULE ID:712860)

Rule General Information
Release Date: 2019-06-25
Rule Name: HP Persistent Systems Radia Client Automation Command Execution Vulnerability (CVE-2015-1497)
Severity:
CVE ID:
Rule Protection Details
Description: radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: ExploitDB:36169
SecurityFocusBID:72612
ExploitDB:40491
http://packetstormsecurity.com/files/130459/HP-Client-Automation-Command-Injection.html
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://radiasupport.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features