2023-12-11 19:00:22 +00:00
{
"id" : "CVE-2023-6538" ,
"sourceIdentifier" : "security.vulnerabilities@hitachivantara.com" ,
"published" : "2023-12-11T18:15:30.250" ,
2023-12-14 19:00:28 +00:00
"lastModified" : "2023-12-14T17:02:15.203" ,
"vulnStatus" : "Analyzed" ,
2023-12-11 19:00:22 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in Storage, Server or combined Server+Storage administrative roles are able to access SMU configuration backup, that would normally be barred to those specific administrative roles. "
2023-12-12 15:05:13 +00:00
} ,
{
"lang" : "es" ,
"value" : "Las versiones de SMU anteriores a 14.8.7825.01 son susceptibles a la divulgaci\u00f3n de informaci\u00f3n no intencionada mediante la manipulaci\u00f3n de URL. Los usuarios autenticados en funciones administrativas de Almacenamiento, Servidor o combinadas de Servidor+Almacenamiento pueden acceder a la copia de seguridad de la configuraci\u00f3n de SMU, que normalmente estar\u00eda prohibida para esas funciones administrativas espec\u00edficas."
2023-12-11 19:00:22 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-12-14 19:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
} ,
2023-12-11 19:00:22 +00:00
{
"source" : "security.vulnerabilities@hitachivantara.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 7.6 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 4.7
}
]
} ,
"weaknesses" : [
2023-12-14 19:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
} ,
2023-12-11 19:00:22 +00:00
{
"source" : "security.vulnerabilities@hitachivantara.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-285"
}
]
}
] ,
2023-12-14 19:00:28 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachi:system_management_unit_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "14.8.7825.01" ,
"matchCriteriaId" : "7DBFB3A6-CDAB-4988-8471-23B6C147F797"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hitachi:system_management_unit:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97B0CC62-7F81-4A12-880B-9954CF9EA323"
}
]
}
]
}
] ,
2023-12-11 19:00:22 +00:00
"references" : [
{
2023-12-12 19:00:24 +00:00
"url" : "https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_is_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_SMU_configuration_backup_data." ,
2023-12-14 19:00:28 +00:00
"source" : "security.vulnerabilities@hitachivantara.com" ,
"tags" : [
"Vendor Advisory"
]
2023-12-11 19:00:22 +00:00
}
]
}