115 lines
3.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-26870",
"sourceIdentifier": "security_alert@emc.com",
"published": "2022-10-21T18:15:09.767",
"lastModified": "2022-10-24T15:33:21.630",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Dell PowerStore versions 2.1.0.x contain an Authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability under specific configuration. An attacker would gain unauthorized access upon successful exploit."
},
{
"lang": "es",
"value": "Dell PowerStore versiones 2.1.0.x, contienen una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad bajo una configuraci\u00f3n espec\u00edfica. Un atacante obtendr\u00eda acceso no autorizado si la explotaci\u00f3n tuviera \u00e9xito"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:powerstoreos:2.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D654464C-49A7-4C9F-A7A8-9523FC5F8A46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:powerstoreos:2.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A138E8-C23C-4937-8033-78B8712516D5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/000196367",
"source": "security_alert@emc.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}