René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.5 KiB
JSON

{
"id": "CVE-2021-26586",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2021-08-05T21:15:11.780",
"lastModified": "2021-08-13T17:25:24.303",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A potential security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to disclose sensitive information. HPE has made software updates available to resolve the vulnerability in the HPE Edgeline Infrastructure Manager (EIM)."
},
{
"lang": "es",
"value": "Se ha identificado una posible vulnerabilidad de seguridad en HPE Edgeline Infrastructure Manager, tambi\u00e9n se conoce como HPE Edgeline Infrastructure Management Software. La vulnerabilidad podr\u00eda ser explotada remotamente para divulgar informaci\u00f3n confidencial. HPE ha puesto a disposici\u00f3n actualizaciones de software para resolver la vulnerabilidad en HPE Edgeline Infrastructure Manager (EIM)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:edgeline_infrastructure_management:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.24",
"matchCriteriaId": "80F5C01F-0088-4DDF-BBD7-48C10D0951FF"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04180en_us",
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2021-33",
"source": "security-alert@hpe.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}