René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.9 KiB
JSON

{
"id": "CVE-2021-29203",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2021-05-06T21:15:07.647",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration. HPE has released a software update to resolve the vulnerability in the HPE Edgeline Infrastructure Manager."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de seguridad en HPE Edgeline Infrastructure Manager, tambi\u00e9n se conoce como software de gesti\u00f3n de infraestructura HPE Edgeline, versiones anteriores a 1.22. La vulnerabilidad podr\u00eda ser explotada remotamente para omitir la autenticaci\u00f3n remota que conlleva a una ejecuci\u00f3n de comandos arbitrarios, consiguiendo acceso privilegiado, causando una denegaci\u00f3n de servicio y cambiando la configuraci\u00f3n. HPE ha lanzado una actualizaci\u00f3n de software para resolver la vulnerabilidad en HPE Edgeline Infrastructure Manager"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:edgeline_infrastructure_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.22",
"matchCriteriaId": "814F61E6-CAFA-4029-9D95-6E5724523ED8"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04124en_us",
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2021-15",
"source": "security-alert@hpe.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}