mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
380 lines
10 KiB
JSON
380 lines
10 KiB
JSON
{
|
|
"id": "CVE-2022-45963",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-12-27T22:15:15.007",
|
|
"lastModified": "2024-11-21T07:30:01.190",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "h3c firewall <= 3.10 ESS6703 has a privilege bypass vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "h3c firewall <= 3.10 ESS6703 tiene una vulnerabilidad de omisi\u00f3n de privilegios."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f5030_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "3C353DBC-587B-4A73-BEB9-3FB948181834"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f5030:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C6311CB2-B059-4854-A77B-863C0CC72FDE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f5060_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "A8CCBDDE-4C66-4D48-BECB-5C630A813BDC"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f5060:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8604E100-30C7-4E77-A472-F2EFCD6360F3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f5080_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "17D06207-8F52-4E32-A574-2132117F5BDD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f5080:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "41EAD39A-A15B-420A-B237-8ADAA4623255"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f5030-d_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "079B3E3C-F521-4536-9DBF-CFD91E5A7EFD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f5030-d:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7080A381-EC22-4F44-A9F5-4359C4590060"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f5060-d_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "E17FB437-FD6B-4F1F-9868-248C5114C080"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f5060-d:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBEFB7DC-AC49-47FE-9DDF-AA4414B56901"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f5080-d_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "7AF0E6CD-FDB8-4539-BD43-56561F55FEB4"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f5080-d:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93E15892-27B3-4941-8AF8-E7C118286D53"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f500-6gw_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "870DDE55-3D5B-4103-B082-0B86757AAC2A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f500-6gw:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4FA952FB-54A3-47D4-981B-5A8D185D8026"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f5010_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "E1E3010C-2BCD-4F60-BD5D-6C3A423811F9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f5010:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FFA969D9-1E07-42DA-BB3F-BD55EEE57FAB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f5020_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "7E91D610-C961-413E-8F0C-8687A90B1882"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f5020:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43401788-4C60-4C45-B3DC-DF62CB5C028A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f5040_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "DD191E2B-307B-4A70-8E64-C2A52F4FB2B6"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f5040:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92B7EEA9-B561-40DF-ABC3-6CB5A8ECEE28"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:h3c:secpath_f100-c-g3_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.10_ess6703",
|
|
"matchCriteriaId": "BBCF6C61-1E65-4DFB-AEA5-DA3331E20F04"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:h3c:secpath_f100-c-g3:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E05E04B6-F07F-47C7-AF97-3E5A7E062EA4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://gist.github.com/yinfei6/fc6478328f8c2e2bf62a631a81afb265",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://gist.github.com/yinfei6/fc6478328f8c2e2bf62a631a81afb265",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |