125 lines
4.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-23705",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2022-05-09T21:15:08.090",
"lastModified": "2024-11-21T06:49:08.683",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been identified in HPE Nimble Storage Hybrid Flash Arrays, HPE Nimble Storage All Flash Arrays, and HPE Nimble Storage Secondary Flash Arrays which could potentially allow the upload, but not execution, of unauthorized update binaries to the array. HPE has made the following software updates to resolve the vulnerability in HPE Nimble Storage: 5.0.10.100 or later, 5.2.1.0 or later, 6.0.0.100 or later."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de seguridad en las matrices HPE Nimble Storage Hybrid Flash, las matrices HPE Nimble Storage All Flash y las matrices HPE Nimble Storage Secondary Flash que podr\u00eda permitir una carga, pero no una ejecuci\u00f3n, de binarios de actualizaci\u00f3n no autorizados en la matriz. HPE ha realizado las siguientes actualizaciones de software para resolver la vulnerabilidad en HPE Nimble Storage: versiones 5.0.10.100 o posteriores, versiones 5.2.1.0 o posteriores, versiones 6.0.0.100 o posteriores"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
2023-04-24 12:24:31 +02:00
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
2023-04-24 12:24:31 +02:00
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.10.100",
"matchCriteriaId": "6C17B31B-672E-4A30-8C76-42E2FF2B05F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1.0.0",
"versionEndExcluding": "5.2.1.500",
"matchCriteriaId": "9CF896B4-F62C-4C4F-A7F5-DFF842F403DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:nimbleos:5.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AEF13515-9B03-4335-8E14-707CD8245F05"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst04273en_us",
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst04273en_us",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}