René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

136 lines
3.9 KiB
JSON

{
"id": "CVE-2022-37940",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-22T06:15:09.217",
"lastModified": "2023-03-29T13:18:08.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Potential security vulnerabilities have been identified in the HPE FlexFabric 5700 Switch Series. These vulnerabilities could be remotely exploited to allow host header injection and URL redirection. HPE has made the following software to resolve the vulnerability in HPE FlexFabric 5700 Switch Series version R2432P61 or later."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:flexfabric_5700_40xg_2qsfp\\+_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "r2432p61",
"matchCriteriaId": "C08ADF37-2BE0-4828-AC19-FD25D46A9D80"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:flexfabric_5700_40xg_2qsfp\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FFBC88F-1F91-4FF4-9A27-D65DA92CF1BF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:flexfabric_5700_48g_4xg_2qsfp\\+_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "r2432p61",
"matchCriteriaId": "F85A92DD-7214-4168-81EC-45196D5AF9DE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:flexfabric_5700_48g_4xg_2qsfp\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F9D66CB-30F0-41B1-B812-9FFFB1BD7219"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04398en_us",
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
}
]
}