René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

129 lines
5.0 KiB
JSON

{
"id": "CVE-2019-11990",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2019-07-19T22:15:11.480",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Security vulnerabilities in HPE UIoT versions 1.6, 1.5, 1.4.2, 1.4.1, 1.4.0, and 1.2.4.2 could allow unauthorized remote access and access to sensitive data. HPE has addressed this issue in HPE UIoT: * For customers with release UIoT 1.6, fixes are made available with 1.6 RP603 * For customers with release UIoT 1.5, fixes are made available with 1.5 RP503 HF3 * For customers with release older than 1.5, such as 1.4.0, 1.4.1, 1.4.2 and 1.2.4.2, the resolution will be to upgrade to 1.5 RP503 HF3 or 1.6 RP603 Customers are requested to upgrade to the updated versions or contact HPE support for further assistance."
},
{
"lang": "es",
"value": "Las vulnerabilidades de seguridad en las versiones 1.6, 1.5, 1.4.2, 1.4.1, 1.4.0 y 1.2.4.2 de HPE UIoT podr\u00edan permitir el acceso remoto no autorizado y el acceso a datos confidenciales. HPE ha abordado este problema en HPE UIoT: * Para los clientes con la versi\u00f3n UIoT 1.6, las correcciones est\u00e1n disponibles con 1.6 RP603 * Para los clientes con la versi\u00f3n UIoT 1.5, las correcciones est\u00e1n disponibles con 1.5 RP503 HF3 * Para los clientes con una versi\u00f3n anterior a 1.5, como como 1.4.0, 1.4.1, 1.4.2 y 1.2.4.2, la resoluci\u00f3n ser\u00e1 actualizar a 1.5 RP503 HF3 o 1.6 RP603 Los clientes deben actualizar a las versiones actualizadas o ponerse en contacto con el soporte de HPE para obtener m\u00e1s ayuda."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:universal_internet_of_things:1.2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9122AE4B-9F75-499D-AAC3-397F8BFD5FC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:universal_internet_of_things:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F3BCE1E-0F75-4CB4-8752-533C4E53E10B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:universal_internet_of_things:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFF3936-D055-4621-A469-BFF3D6801949"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:universal_internet_of_things:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FE59A6-8B7E-468F-AD75-D139C48FAE78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:universal_internet_of_things:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "26A57743-E49C-403E-9F06-9EFFABEDB2AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:universal_internet_of_things:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0397C8C9-3DB4-4BEB-BA2F-FE509760CD0B"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03937en_us",
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
}
]
}