cvelist/2024/22xxx/CVE-2024-22437.json

96 lines
3.1 KiB
JSON
Raw Normal View History

2024-01-10 16:00:36 +00:00
{
2024-04-15 10:00:34 +00:00
"data_version": "4.0",
2024-01-10 16:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-22437",
2024-04-15 10:00:34 +00:00
"ASSIGNER": "security-alert@hpe.com",
"STATE": "PUBLIC"
2024-01-10 16:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-15 10:00:34 +00:00
"value": "\nA potential security vulnerability has been identified in VSS Provider and CAPI Proxy software for certain HPE MSA storage products. This vulnerability could be exploited to gain elevated privilege on the system.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-428 Unquoted Search Path or Element",
"cweId": "CWE-428"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Hewlett Packard Enterprise",
"product": {
"product_data": [
{
"product_name": "HPE MSA SAN Storage VSS Provider and CAPI Proxy Software",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "N/A",
"version_value": "4.1.3.83"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbst04630en_us",
"refsource": "MISC",
"name": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbst04630en_us"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "HPESBST04630",
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "R Cooper of Environtec Limited"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
2024-01-10 16:00:36 +00:00
}
]
}
}