René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

141 lines
4.9 KiB
JSON

{
"id": "CVE-2022-28618",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2022-05-20T21:15:10.130",
"lastModified": "2022-06-07T21:25:35.507",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A command injection security vulnerability has been identified in HPE Nimble Storage Hybrid Flash Arrays, HPE Nimble Storage All Flash Arrays and HPE Nimble Storage Secondary Flash Arrays that could allow an attacker to execute arbitrary commands on a Nimble appliance. HPE has made the following software updates to resolve the vulnerability in HPE Nimble Storage: 5.0.10.100 or later, 5.2.1.0 or later, 6.0.0.100 or later."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de seguridad de inyecci\u00f3n de comandos en las matrices HPE Nimble Storage Hybrid Flash Arrays, HPE Nimble Storage All Flash Arrays y HPE Nimble Storage Secondary Flash Arrays que podr\u00eda permitir a un atacante ejecutar comandos arbitrarios en un dispositivo Nimble. HPE ha realizado las siguientes actualizaciones de software para resolver la vulnerabilidad en HPE Nimble Storage: versiones 5.0.10.100 o posteriores, versiones 5.2.1.0 o posteriores, versiones 6.0.0.100 o posteriores"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.10.100",
"matchCriteriaId": "6C17B31B-672E-4A30-8C76-42E2FF2B05F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1.0.0",
"versionEndExcluding": "5.2.1.500",
"matchCriteriaId": "9CF896B4-F62C-4C4F-A7F5-DFF842F403DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3.0.0",
"versionEndExcluding": "6.0.0.100",
"matchCriteriaId": "BA27845C-064D-4170-A8CA-894C2340D0AC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:nimble_storage_all_flash_arrays:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE47BAE5-C331-47EF-9A39-E4611001CD12"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:nimble_storage_hybrid_flash_arrays:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7029B46E-54DC-403B-BE6A-E51A539C026A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:nimble_storage_secondary_flash_arrays:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD1E0DC2-CBA3-4921-8458-705F6709E3D5"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst04276en_us",
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
}
]
}