René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

118 lines
3.7 KiB
JSON

{
"id": "CVE-2019-11991",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2019-07-09T19:15:12.013",
"lastModified": "2019-07-16T13:43:04.563",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "HPE has identified a vulnerability in HPE 3PAR Service Processor (SP) version 4.1 through 4.4. HPE 3PAR Service Processor (SP) version 4.1 through 4.4 has a remote information disclosure vulnerability which can allow for the disruption of the confidentiality, integrity and availability of the Service Processor and any managed 3PAR arrays."
},
{
"lang": "es",
"value": "HPE ha identificado una vulnerabilidad en HPE 3PAR Service Processor (SP) versi\u00f3n 4.1 hasta 4.4. HPE 3PAR Service Processor (SP) versi\u00f3n 4.1 hasta 4.4 presenta una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n remota que puede permitir la ruptura de la confidencialidad, integridad y disponibilidad del procesador de servicios y cualquier matriz 3PAR administrada."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.7
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 9.5,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:3par_service_processor_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1",
"versionEndIncluding": "4.4",
"matchCriteriaId": "AB0AEAFC-B517-498E-A850-B4FD3CBB5EA8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hp:3par_service_processor:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9EB35E-D915-4C4E-81F5-8DAC3FD2336C"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03918en_us",
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
}
]
}