{ "id": "CVE-2019-5401", "sourceIdentifier": "security-alert@hpe.com", "published": "2019-08-01T22:15:12.037", "lastModified": "2019-08-08T14:31:27.850", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A potential security vulnerability has been identified in HP2910al-48G version W.15.14.0016. The attack exploits an xss injection by setting the attack vector in one of the switch persistent configuration fields (management URL, location, contact). But admin privileges are required to configure these fields thereby reducing the likelihood of exploit. HPE Aruba has provided firmware updates to resolve the vulnerability in HP 2910-48G al Switch. Please update to W.15.14.0017." }, { "lang": "es", "value": "Se ha identificado una posible vulnerabilidad de seguridad en HP2910al-48G versi\u00f3n W.15.14.0016. El ataque explota una inyecci\u00f3n xss configurando el vector de ataque en uno de los campos de configuraci\u00f3n persistente del conmutador (URL de administraci\u00f3n, ubicaci\u00f3n, contacto). Pero se requieren privilegios de administrador para configurar estos campos, reduciendo as\u00ed la probabilidad de explotaci\u00f3n. HPE Aruba ha proporcionado actualizaciones de firmware para resolver la vulnerabilidad en HP 2910-48G al Switch. Actualice a W.15.14.0017." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.7, "impactScore": 2.7 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 3.5 }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:hp:hp2910al-48g_firmware:w.15.14.00.16:*:*:*:*:*:*:*", "matchCriteriaId": "6D312561-2172-40DE-9D7C-26189F044745" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:hp:hp2910al-48g:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBB9D0FD-DC04-4FCD-BC61-0B4356BB7070" } ] } ] } ], "references": [ { "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03944en_us", "source": "security-alert@hpe.com", "tags": [ "Vendor Advisory" ] } ] }