2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-3191" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2021-02-09T19:15:13.837" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T06:21:06.783" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows Remote Unauthorized Access for T0320L01^ABY and T0320L01^ACD, T0952L01^AAR through T0952L01^AAX, and T0986L01^AAD through T0986L01^AAJ (L) and T0320H01^ABW through T0320H01^ACC, T0952H01^AAQ through T0952H01^AAW, and T0986H01^AAC through T0986H01^AAI (J and H)."
} ,
{
"lang" : "es" ,
"value" : "Idelji Web ViewPoint Suite, tal como es usada en conjunto con HPE NonStop, permite el acceso remoto no autorizado para T0320L01^ABY y T0320L01^ACD, T0952L01^AAR hasta T0952L01^AAX y T0986L01^AAD hasta T0986L01^AAJ (L) y T0320H01 T0320H01^ACC, T0952H01^AAQ hasta T0952H01^AAW y T0986H01^AAC hasta T0986H01^AAI (J y H)"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:C/I:C/A:C" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "06.03" ,
"versionEndIncluding" : "06.23.01" ,
"matchCriteriaId" : "854CE3D0-C2E9-475D-A079-C4185A2BE4C6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.08.00" ,
"versionEndIncluding" : "19.08.00" ,
"matchCriteriaId" : "E42D9831-656D-47D0-BFEA-B57E0AF445E8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "t0320h01\\^abw" ,
"versionEndIncluding" : "t0320h01\\^acc" ,
"matchCriteriaId" : "204FCE16-72AA-4516-B2EB-B813A429DBE2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "t0952h01\\^aaq" ,
"versionEndIncluding" : "t0952h01\\^aaw" ,
"matchCriteriaId" : "A7C43A33-0CBE-473F-844D-2C18721C3555"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "t0952l01\\^aar" ,
"versionEndIncluding" : "t0952l01\\^aax" ,
"matchCriteriaId" : "18AC804E-31E2-4A9E-A218-C130DB00A779"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "t0986h01\\^aac" ,
"versionEndIncluding" : "t0986h01\\^aai" ,
"matchCriteriaId" : "47A9BFCE-6B14-46F0-A12B-4974D114643F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "t0986l01\\^aad" ,
"versionEndIncluding" : "t0986l01\\^aaj" ,
"matchCriteriaId" : "667CD5A6-FA80-4265-BB1C-407CAB0F4BE3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:15.02.00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0EB6DB3-9698-4B2A-ABC4-51B1BCF6A3E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:15.02.01:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C8608EB2-4214-425E-823A-441AA00C7A38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:t0320l01\\^aby:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5FE0E6DB-7571-484A-A414-5A0FB41FC4DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:web_viewpoint:t0320l01\\^acd:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D2873C5-48BB-40E5-9168-50DEE865D60C"
}
]
2024-12-08 03:06:42 +00:00
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:hpe:nonstop:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "55858925-B0CD-4C4D-8CAA-DFA1B36C0DE0"
}
]
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"references" : [
{
"url" : "https://idelji.com" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Product"
]
} ,
{
"url" : "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbns04081en_us" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://techpartner.ext.hpe.com/TechPartner/PartnerDetail.xhtml?Partner=Idelji" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://idelji.com" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Product"
]
} ,
{
"url" : "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbns04081en_us" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://techpartner.ext.hpe.com/TechPartner/PartnerDetail.xhtml?Partner=Idelji" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}