Vulnerabilites related to hp - apollo_4500
Vulnerability from fkie_nvd
Published
2022-09-20 21:15
Modified
2024-11-21 06:57
Summary
A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hp apollo_4200_gen10_server -
hp apollo_4500 -
hp apollo_r2000_chassis -
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_plus_system -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe integrated_lights-out_5 -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3DF16F-EC27-4124-89B7-A580EF19D9EE",
              "versionEndExcluding": "2.72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7E4EA1D-8ACB-4C6C-AB96-80BC8FD71FB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B6BCFC-3AF2-4282-93F8-F64CE98FDC4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9311154A-E0EF-46B3-B8D0-6ED540029684",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "970779A7-00C5-4A06-89B1-717418934EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5370AF-C0B8-4E75-8B01-A4239B130E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una posible denegaci\u00f3n de servicio (DoS) remota y una posible vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario adyacente que podr\u00eda conllevar a una p\u00e9rdida de confidencialidad, integridad y disponibilidad en HPE Integrated Lights-Out 5 (iLO 5) en Versi\u00f3n: 2.71. Hewlett Packard Enterprise ha proporcionado un firmware actualizado para HPE Integrated Lights-Out 5 (iLO 5) que aborda estas vulnerabilidades de seguridad"
    }
  ],
  "id": "CVE-2022-28639",
  "lastModified": "2024-11-21T06:57:38.023",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-20T21:15:10.457",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-20 21:15
Modified
2024-11-21 06:57
Summary
A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hp apollo_4200_gen10_server -
hp apollo_4500 -
hp apollo_r2000_chassis -
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_plus_system -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe integrated_lights-out_5 -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3DF16F-EC27-4124-89B7-A580EF19D9EE",
              "versionEndExcluding": "2.72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7E4EA1D-8ACB-4C6C-AB96-80BC8FD71FB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B6BCFC-3AF2-4282-93F8-F64CE98FDC4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9311154A-E0EF-46B3-B8D0-6ED540029684",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "970779A7-00C5-4A06-89B1-717418934EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5370AF-C0B8-4E75-8B01-A4239B130E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio (DoS) local y de ejecuci\u00f3n de c\u00f3digo arbitrario local que podr\u00eda conllevar a una p\u00e9rdida de confidencialidad, integridad y disponibilidad en HPE Integrated Lights-Out 5 (iLO 5) en versi\u00f3n: 2.71. Hewlett Packard Enterprise ha proporcionado un firmware actualizado para HPE Integrated Lights-Out 5 (iLO 5) que aborda estas vulnerabilidades de seguridad"
    }
  ],
  "id": "CVE-2022-28637",
  "lastModified": "2024-11-21T06:57:37.790",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-20T21:15:10.377",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-20 21:15
Modified
2024-11-21 06:57
Summary
A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability.
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hp apollo_4200_gen10_server -
hp apollo_4500 -
hp apollo_r2000_chassis -
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_plus_system -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe integrated_lights-out_5 -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3DF16F-EC27-4124-89B7-A580EF19D9EE",
              "versionEndExcluding": "2.72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7E4EA1D-8ACB-4C6C-AB96-80BC8FD71FB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B6BCFC-3AF2-4282-93F8-F64CE98FDC4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9311154A-E0EF-46B3-B8D0-6ED540029684",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "970779A7-00C5-4A06-89B1-717418934EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5370AF-C0B8-4E75-8B01-A4239B130E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una potencial vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario local adyacente que podr\u00eda conllevar a una p\u00e9rdida de confidencialidad, integridad y disponibilidad en HPE Integrated Lights-Out 5 (iLO 5) en versi\u00f3n: 2.71. Hewlett Packard Enterprise ha proporcionado un firmware actualizado para HPE Integrated Lights-Out 5 (iLO 5) que aborda esta vulnerabilidad de seguridad"
    }
  ],
  "id": "CVE-2022-28640",
  "lastModified": "2024-11-21T06:57:38.133",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-20T21:15:10.497",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-20 21:15
Modified
2024-11-21 06:57
Summary
An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hp apollo_4200_gen10_server -
hp apollo_4500 -
hp apollo_r2000_chassis -
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_plus_system -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe integrated_lights-out_5 -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3DF16F-EC27-4124-89B7-A580EF19D9EE",
              "versionEndExcluding": "2.72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7E4EA1D-8ACB-4C6C-AB96-80BC8FD71FB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B6BCFC-3AF2-4282-93F8-F64CE98FDC4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9311154A-E0EF-46B3-B8D0-6ED540029684",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "970779A7-00C5-4A06-89B1-717418934EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5370AF-C0B8-4E75-8B01-A4239B130E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una divulgaci\u00f3n local aislada de informaci\u00f3n y una posible vulnerabilidad local aislada de ejecuci\u00f3n de c\u00f3digo arbitrario que podr\u00eda conllevar a una p\u00e9rdida de confidencialidad, integridad y disponibilidad en HPE Integrated Lights-Out 5 (iLO 5), en Versi\u00f3n: 2.71, . Hewlett Packard Enterprise ha proporcionado un firmware actualizado para HPE Integrated Lights-Out 5 (iLO 5) que aborda estas vulnerabilidades de seguridad"
    }
  ],
  "id": "CVE-2022-28638",
  "lastModified": "2024-11-21T06:57:37.910",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-20T21:15:10.417",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-11-05 21:15
Modified
2024-11-21 05:36
Summary
A local elevation of privilege using physical access security vulnerability was found in HPE Proliant Gen10 Servers using Intel Innovation Engine (IE). This attack requires a physical attack to the server motherboard. To mitigate this issue, ensure your server is always physically secured. HPE will not address this issue in the impacted Gen 10 servers listed. HPE recommends using appropriate physical security methods as a compensating control to disallow an attacker from having physical access to the server main circuit board.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:apollo_2000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A79CFC7D-7D39-4FBA-8313-14A096A776EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9FF05F7-F7FC-4817-805B-A69B22BBEDFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:apollo_4200_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB2D71E9-69F0-4189-9EAF-3E8355874D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_4200_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5A726F-CDA8-4804-AE63-B5C156574614",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:apollo_4500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2177A2E1-006E-4A4F-AA8D-EB28541F4A56",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B6BCFC-3AF2-4282-93F8-F64CE98FDC4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_xl230k_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951FFEA5-1A35-4E9F-B7A6-1B18ADEFB0C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_xl230k_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85739B50-AA18-4097-8EAA-3A750EE38AE6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_xl270d_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0DEAA8-BD1A-4A1C-B9EE-DDE64DFED8F7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_xl270d_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F114945A-DDC6-4CCB-B368-B60F5780F0E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_bl460c_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10233E2A-DC4F-46C1-9B9E-2277ABD61EE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_bl460c_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEC03C5-6E25-47A3-9793-D411056F5D08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_dl120_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD93C572-82C9-47FD-BAC8-B7E6BE873C3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_dl120_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43D747DD-AF47-4B5A-B9CC-20BEC97E7788",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_dl160_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2184DC92-0990-48E3-8E10-3D051CB0F3E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_dl160_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0DEA2A-F511-4111-8B33-B029E75D56BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_dl180_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5266B27-BFC8-4C30-85AC-7FD699B1CC64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_dl180_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5077B450-1E11-4338-8F76-E4257FBE9260",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_dl360_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5046B6-B06B-400E-9896-C763513594F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_dl360_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45369573-58FC-40E2-8124-08CDEAB6B6C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_dl380_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93790EF-A41D-4B9D-ADFC-7B45692F6904",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_dl380_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5D074B-079C-4227-A2A5-654BB35E7DC3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_dl560_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFBFD5CB-FBE0-4E20-875F-A37514EF962B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_dl560_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894E6C9-D248-4800-A138-CD0FE8F6B5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_dl580_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99D7A1BB-7D89-4AF6-89E6-D23CEA04D4B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_dl580_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEBB303-F21A-47FF-9D79-5CBC90144782",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_ml110_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDFAD1DD-F83F-4A83-A009-0C8ED3CB550C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_ml110_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA54BDB5-28DF-46D6-8D7D-F2F4F3B21381",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_ml350_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DC576AA-38DB-4D3A-B6E4-FB8EF460DFA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_ml350_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FF6A55B-05B4-4286-BF06-45D2A21EF58F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:synergy_480_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE0AD61A-E83A-4B7C-AA75-D6AA8055DC00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:synergy_480_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56E065B7-BC38-4CFE-A640-1236A8FFF8F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:synergy_660_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A86647F-758D-4E44-A1C2-D29E0F6B6E79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:synergy_660_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C5572E-CA26-4B2D-B3AA-BEA466ACD7F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_e910_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39166E75-89B6-4406-81F2-3B8FAC53F9E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_e910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "236284B7-DC2E-40F8-A265-EE91469ADD9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_xl170r_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EEBA228-639C-4FA2-B57C-069276C66663",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_xl170r_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6662F50-79E8-4675-ABAB-E95C7B8A2BBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_xl190r_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "953327FE-57FB-4FF6-972F-83B02DF855F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_xl190r_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D33F488-C5DB-40A7-BCAB-4DA1A6FC0096",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_xl230k_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951FFEA5-1A35-4E9F-B7A6-1B18ADEFB0C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_xl230k_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85739B50-AA18-4097-8EAA-3A750EE38AE6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:proliant_xl450_gen10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19571A56-2E69-4563-841A-991323961B48",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:proliant_xl450_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C2B30A8-303D-4A47-8D9A-7088F82D2BA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local elevation of privilege using physical access security vulnerability was found in HPE Proliant Gen10 Servers using Intel Innovation Engine (IE). This attack requires a physical attack to the server motherboard. To mitigate this issue, ensure your server is always physically secured. HPE will not address this issue in the impacted Gen 10 servers listed. HPE recommends using appropriate physical security methods as a compensating control to disallow an attacker from having physical access to the server main circuit board."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 una vulnerabilidad de elevaci\u00f3n local de privilegios usando la seguridad de acceso f\u00edsico en HPE Proliant Gen10 Servers que utiliza Intel Innovation Engine (IE).\u0026#xa0;Este ataque requiere un ataque f\u00edsico a la tarjeta madre del servidor.\u0026#xa0;Para mitigar este problema, aseg\u00farese de que su servidor est\u00e9 siempre protegido f\u00edsicamente.\u0026#xa0;HPE no abordar\u00e1 este problema en los servidores Gen 10 listados que est\u00e1n afectados .\u0026#xa0;HPE recomienda el uso de m\u00e9todos de seguridad f\u00edsica apropiados como el control de compensaci\u00f3n para no permitir que un atacante tenga acceso f\u00edsico a la tarjeta del circuito principal del servidor"
    }
  ],
  "id": "CVE-2020-7207",
  "lastModified": "2024-11-21T05:36:49.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-11-05T21:15:13.063",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04002en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04002en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2020-7207
Vulnerability from cvelistv5
Published
2020-11-05 20:14
Modified
2024-08-04 09:25
Severity ?
Summary
A local elevation of privilege using physical access security vulnerability was found in HPE Proliant Gen10 Servers using Intel Innovation Engine (IE). This attack requires a physical attack to the server motherboard. To mitigate this issue, ensure your server is always physically secured. HPE will not address this issue in the impacted Gen 10 servers listed. HPE recommends using appropriate physical security methods as a compensating control to disallow an attacker from having physical access to the server main circuit board.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T09:25:48.465Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04002en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE ProLiant BL460c Gen10 Server Blade; HPE ProLiant DL360 Gen10 Server; HPE ProLiant DL380 Gen10 Server; HPE ProLiant DL560 Gen10 Server; HPE ProLiant DL580 Gen10 Server; HPE ProLiant ML110 Gen10 Server; HPE ProLiant XL230k Gen10 Server; HPE Synergy 480 Gen10 Compute Module; HPE Synergy 660 Gen10 Compute Module; HPE ProLiant DL180 Gen10 Server; HPE ProLiant DL160 Gen10 Server; HPE ProLiant DL120 Gen10 Server; HPE ProLiant XL190r Gen10 Server; HPE ProLiant ML350 Gen10 Server; HPE ProLiant XL170r Gen10 Server; HPE Apollo 2000 System; HPE Apollo 4500 System; HPE ProLiant XL270d Gen10 Server; HPE Apollo 4200 Gen10 Server; HPE ProLiant e910 Server Blade; HPE ProLiant XL450 Gen10 Server; HPE ProLiant XL230k Gen10 Server - bad oid",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "all current IE firmware"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local elevation of privilege using physical access security vulnerability was found in HPE Proliant Gen10 Servers using Intel Innovation Engine (IE). This attack requires a physical attack to the server motherboard. To mitigate this issue, ensure your server is always physically secured. HPE will not address this issue in the impacted Gen 10 servers listed. HPE recommends using appropriate physical security methods as a compensating control to disallow an attacker from having physical access to the server main circuit board."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local elevation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-05T20:14:32",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04002en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2020-7207",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE ProLiant BL460c Gen10 Server Blade; HPE ProLiant DL360 Gen10 Server; HPE ProLiant DL380 Gen10 Server; HPE ProLiant DL560 Gen10 Server; HPE ProLiant DL580 Gen10 Server; HPE ProLiant ML110 Gen10 Server; HPE ProLiant XL230k Gen10 Server; HPE Synergy 480 Gen10 Compute Module; HPE Synergy 660 Gen10 Compute Module; HPE ProLiant DL180 Gen10 Server; HPE ProLiant DL160 Gen10 Server; HPE ProLiant DL120 Gen10 Server; HPE ProLiant XL190r Gen10 Server; HPE ProLiant ML350 Gen10 Server; HPE ProLiant XL170r Gen10 Server; HPE Apollo 2000 System; HPE Apollo 4500 System; HPE ProLiant XL270d Gen10 Server; HPE Apollo 4200 Gen10 Server; HPE ProLiant e910 Server Blade; HPE ProLiant XL450 Gen10 Server; HPE ProLiant XL230k Gen10 Server - bad oid",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "all current IE firmware"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local elevation of privilege using physical access security vulnerability was found in HPE Proliant Gen10 Servers using Intel Innovation Engine (IE). This attack requires a physical attack to the server motherboard. To mitigate this issue, ensure your server is always physically secured. HPE will not address this issue in the impacted Gen 10 servers listed. HPE recommends using appropriate physical security methods as a compensating control to disallow an attacker from having physical access to the server main circuit board."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local elevation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04002en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04002en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2020-7207",
    "datePublished": "2020-11-05T20:14:32",
    "dateReserved": "2020-01-16T00:00:00",
    "dateUpdated": "2024-08-04T09:25:48.465Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28639
Vulnerability from cvelistv5
Published
2022-09-20 20:06
Modified
2024-08-03 05:56
Severity ?
Summary
A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
n/a HPE Integrated Lights-Out 5 (iLO 5) Version: Prior to 2.72
Version: unspecified
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.403Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.72"
            },
            {
              "status": "affected",
              "version": "unspecified"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "remote potential adjacent denial of service (DoS); potential adjacent arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-20T20:06:05",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28639",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.72"
                          },
                          {
                            "version_value": ""
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "remote potential adjacent denial of service (DoS); potential adjacent arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28639",
    "datePublished": "2022-09-20T20:06:05",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28640
Vulnerability from cvelistv5
Published
2022-09-20 20:01
Modified
2024-08-03 05:56
Severity ?
Summary
A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability.
Impacted products
Vendor Product Version
n/a HPE Integrated Lights-Out 5 (iLO 5) Version: Prior to 2.72
Version: unspecified
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.403Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.72"
            },
            {
              "status": "affected",
              "version": "unspecified"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "potential local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-20T20:01:58",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28640",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.72"
                          },
                          {
                            "version_value": ""
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "potential local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28640",
    "datePublished": "2022-09-20T20:01:58",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28638
Vulnerability from cvelistv5
Published
2022-09-20 20:04
Modified
2024-08-03 05:56
Severity ?
Summary
An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
n/a HPE Integrated Lights-Out 5 (iLO 5) Version: Prior to 2.72
Version: unspecified
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.453Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.72"
            },
            {
              "status": "affected",
              "version": "unspecified"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "isolated local disclosure of information; potential isolated local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-20T20:04:47",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28638",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.72"
                          },
                          {
                            "version_value": ""
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "isolated local disclosure of information; potential isolated local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28638",
    "datePublished": "2022-09-20T20:04:47",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.453Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28637
Vulnerability from cvelistv5
Published
2022-09-20 20:07
Modified
2024-08-03 05:56
Severity ?
Summary
A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
n/a HPE Integrated Lights-Out 5 (iLO 5) Version: Prior to 2.72
Version: unspecified
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.447Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.72"
            },
            {
              "status": "affected",
              "version": "unspecified"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local denial of service (DoS); potential local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-20T20:07:13",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28637",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.72"
                          },
                          {
                            "version_value": ""
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local denial of service (DoS); potential local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28637",
    "datePublished": "2022-09-20T20:07:13",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.447Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}