mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
121 lines
5.7 KiB
JSON
121 lines
5.7 KiB
JSON
{
|
|
"id": "CVE-2020-7131",
|
|
"sourceIdentifier": "security-alert@hpe.com",
|
|
"published": "2020-04-24T18:15:13.073",
|
|
"lastModified": "2021-07-21T11:39:23.747",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "This document describes a security vulnerability in Blade Maintenance Entity, Integrated Maintenance Entity and Maintenance Entity products. All J/H-series NonStop systems have a security vulnerability associated with an open UDP port 17185 on the Maintenance LAN which could result in information disclosure, denial-of-service attacks or local memory corruption against the affected system and a complete control of the system may also be possible. This vulnerability exists only if one gains access to the Maintenance LAN to which Blade Maintenance Entity, Integrated Maintenance Entity or Maintenance Entity product is connected. **Workaround:** Block the UDP port 17185(In the Maintenance LAN Network Switch/Firewall). Fix: Install following SPRs, which are already available: * T1805A01^AAI (Integrated Maintenance Entity) * T4805A01^AAZ (Blade Maintenance Entity). These SPRs are also usable with the following RVUs: * J06.19.00 ? J06.23.01. No fix planned for the following RVUs: J06.04.00 ? J06.18.01. No fix planned for H-Series NonStop systems. No fix planned for the product T2805 (Maintenance Entity)."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Este documento describe una vulnerabilidad de seguridad en los productos Blade Maintenance Entity, Integrated Maintenance Entity y Maintenance Entity. Todos los sistemas NonStop de la serie J/H tiene una vulnerabilidad de seguridad asociada con un puerto UDP 17185 abierto en la LAN de Mantenimiento que podr\u00eda resultar en una divulgaci\u00f3n de informaci\u00f3n, ataques de denegaci\u00f3n de servicio o una corrupci\u00f3n de la memoria local contra el sistema afectado y un control completo del sistema tambi\u00e9n puede ser posible. Esta vulnerabilidad se presenta solo si se consigue acceso a la LAN de Mantenimiento a la que est\u00e1 conectado el producto Blade Maintenance Entity, Integrated Maintenance Entity o Maintenance Entity. **Soluci\u00f3n alternativa:** Bloquee el puerto UDP 17185 (en el Switch/Firewall de la Red LAN de Mantenimiento). Correcci\u00f3n: instale los siguientes SPR, que ya est\u00e1n disponibles: * T1805A01^AAI (Integrated Maintenance Entity) * T4805A01^AAZ (Blade Maintenance Entity). Estos SPR tambi\u00e9n pueden ser usados con las siguientes RVU: * J06.19.00 ? J06.23.01. No se han planificado arreglos para las siguientes RVU: J06.04.00 ? J06.18.01. No se planific\u00f3 ninguna soluci\u00f3n para los sistemas NonStop de la Serie H. No se ha planificado ninguna correcci\u00f3n para el producto T2805 (Maintenance Entity)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.0,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 6.0
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-787"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:blade_maintenance_entity:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "t4805a01",
|
|
"versionEndIncluding": "t4805a01\\^aay",
|
|
"matchCriteriaId": "76F9522C-7E37-45BA-9261-507CA6B296AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:integrated_maintenance_entity:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "t2805a01",
|
|
"versionEndIncluding": "t2805a01\\^aau",
|
|
"matchCriteriaId": "4214E700-3EDD-4263-9214-D43EE80D11FE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:maintenance_entity:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "t1805a01",
|
|
"versionEndIncluding": "t1805a01\\^aah",
|
|
"matchCriteriaId": "427649C3-C7C3-4F42-91B0-77B81F7588DE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03996en_us",
|
|
"source": "security-alert@hpe.com",
|
|
"tags": [
|
|
"Mitigation",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |