1. SSH to the box<p>2. Username: hpsupport<p>3. Password (from SHA1 lookup): badg3r5<p>Yes that shit.<p>We have some of this kit in and I've tested it and it works absolutely spot on. Fortunately it's all firewalled off but it's not the sort of crap you want on your doorstep.<p>Nothing to do with the NSA this - just a crappy decision somewhere which is designed to make HP support's life easier. As someone else said: this bug is as old as time.
Misleading article title. (What better to expect from The Register?) HP admitted there's a vulnerabiity that with customer provided access and permission can allow HP support to access underlying os of the storage device. At most a reboot is possible not data access. So this is just another stupid vulnerability that'll be fixed soon - not a backdoor.
HP nicely covering their ass to not get associated with the NSA scandal happening at the moment.
I don't know if the fact that they are trying so hard is an indication that they actually are but this is suspicious.