2023-12-28 21:00:29 +00:00

257 lines
7.4 KiB
JSON

{
"id": "CVE-2020-7122",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2020-09-23T13:15:16.093",
"lastModified": "2023-12-28T19:02:53.863",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Two memory corruption vulnerabilities in the Aruba CX Switches Series 6200F, 6300, 6400, 8320, 8325, and 8400 have been found. Successful exploitation of these vulnerabilities could result in Local Denial of Service of the CDP (Cisco Discovery Protocol) process in the switch. This applies to firmware versions prior to 10.04.1000."
},
{
"lang": "es",
"value": "Se han encontrado dos vulnerabilidades de corrupci\u00f3n de memoria en Aruba CX Switches Series 6200F, 6300, 6400, 8320, 8325, y 8400. Una explotaci\u00f3n con \u00e9xito de estas vulnerabilidades podr\u00eda resultar en una Denegaci\u00f3n de Servicio Local del Proceso CDP (Cisco Discovery Protocol) en el switch. Esto aplica a las versiones de firmware anteriores a 10.04.1000"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:cx_6200f_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "A132767A-E9B9-477E-BAAF-A831694F1FC4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:cx_6200f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CB3993F-B4A6-4016-AF0F-82A23FE34063"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:cx_6300_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "36CB053C-FA12-4065-BC40-FFE6E0B25B00"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:cx_6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C32F7E4-E184-4F76-8638-017DF29D2FFB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:cx_6400_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "270EC51F-3CEC-45C1-9E0F-5D38EB550106"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:cx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A013EAE-387B-4C35-9D8F-E2200081E18E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:cx_8320_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "CE87AAEE-644E-4699-B639-B4CE94D503A5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:cx_8320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C93CD9C-1FD4-4E4A-9E3A-8FF19DE0D3AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:cx_8325_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "9A5483EC-74BF-4C0D-A751-23C9ED42E29A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:cx_8325:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9645D616-077B-4313-B5EF-155B642CB073"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:cx_8400_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.04.1000",
"matchCriteriaId": "B2BFEE7A-D4CC-45BF-B277-8C9849A7F616"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:cx_8400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4FB7A6B-69C5-45EF-BE61-23BCF5172836"
}
]
}
]
}
],
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-009.txt",
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
}
]
}