René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

204 lines
7.8 KiB
JSON

{
"id": "CVE-2021-41002",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2022-03-02T22:15:08.113",
"lastModified": "2022-09-27T17:16:47.820",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities."
},
{
"lang": "es",
"value": "Se han detectado m\u00faltiples vulnerabilidades de salto de ruta remoto autenticadas en la interfaz de l\u00ednea de comandos de AOS-CX en las versiones de la serie de conmutadores Aruba CX 6200F, la serie de conmutadores Aruba 6300, la serie de conmutadores Aruba 6400, la serie de conmutadores Aruba 8320, la serie de conmutadores Aruba 8325, la serie de conmutadores Aruba 8400 y la serie de conmutadores Aruba CX 8360: AOS-CX versiones 10.06.xxxx: 10.06.0170 y anteriores, AOS-CX versiones 10.07.xxxx: 10.07.0050 y anteriores, AOS-CX versiones 10.08.xxxx: 10.08.1030 y anteriores, AOS-CX versiones 10.09.xxxx: 10.09.0002 y anteriores. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX que abordan estas vulnerabilidades de seguridad"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 9.2,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.06.0001",
"versionEndIncluding": "10.06.0170",
"matchCriteriaId": "46EF92A4-497F-4E18-8EFB-CA65C6E13CBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.07.0001",
"versionEndIncluding": "10.07.0050",
"matchCriteriaId": "3F9AB6C6-F5B1-462C-9225-4329C126D7AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.08.0001",
"versionEndIncluding": "10.08.1030",
"matchCriteriaId": "64D93409-2CFC-45B4-852F-3A8CD24E8EF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.09.0001",
"versionEndIncluding": "10.09.0002",
"matchCriteriaId": "6A6004E2-4C71-469F-9C40-470040E053C3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_8320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "486BF5C3-870B-47B7-9C0E-9B35DBE3F41C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_8325-32-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35AC85B2-4960-4F61-B4DB-02598AF6E2E6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_8325-48y8c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "535F4E94-337F-4EE7-8740-CFC5AF310736"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_8360-12c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "257C95D3-8D0F-4878-BC17-DC888975E07C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_8360-16y2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2167087-2E82-4BD0-9791-C837B655A5EA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_8360-24xf2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D8486D5-91D8-457D-BCED-6534768933ED"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_8360-32y4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4362AA75-7C76-4741-934F-B0BF75A7DB9C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_8360-48xt4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4801BD3A-ED8C-42F3-A631-3094A9A82913"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_8400x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB1FBA66-B639-4B0C-A96F-FC74B01B45BB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD1A83B-109B-4596-AE37-706751E2B57D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6F748F-89E9-45FB-8BE7-2201E5EB2755"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8066A871-2683-4F74-9750-E73BF004209F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt",
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
}
]
}