All the vulnerabilites related to cisco - hx220c_m5_firmware
cve-2019-1857
Vulnerability from cvelistv5
Published
2019-05-03 16:40
Modified
2024-11-21 19:32
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco HyperFlex HX-Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system by using a web browser and with the privileges of the user.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-hyperflex-csrf | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108163 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco HyperFlex HX-Series |
Version: unspecified < 4.0(1a) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.871Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190501 Cisco HyperFlex HX-Series Web-Based Management Interface Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-hyperflex-csrf" }, { "name": "108163", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108163" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1857", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:58:47.560601Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:32:04.174Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco HyperFlex HX-Series", "vendor": "Cisco", "versions": [ { "lessThan": "4.0(1a)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco HyperFlex HX-Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system by using a web browser and with the privileges of the user." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-06T12:06:04", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190501 Cisco HyperFlex HX-Series Web-Based Management Interface Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-hyperflex-csrf" }, { "name": "108163", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108163" } ], "source": { "advisory": "cisco-sa-20190501-hyperflex-csrf", "defect": [ [ "CSCvk59399" ] ], "discovery": "INTERNAL" }, "title": "Cisco HyperFlex HX-Series Web-Based Management Interface Cross-Site Request Forgery Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-01T16:00:00-0700", "ID": "CVE-2019-1857", "STATE": "PUBLIC", "TITLE": "Cisco HyperFlex HX-Series Web-Based Management Interface Cross-Site Request Forgery Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco HyperFlex HX-Series", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.0(1a)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco HyperFlex HX-Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system by using a web browser and with the privileges of the user." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.1", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352" } ] } ] }, "references": { "reference_data": [ { "name": "20190501 Cisco HyperFlex HX-Series Web-Based Management Interface Cross-Site Request Forgery Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-hyperflex-csrf" }, { "name": "108163", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108163" } ] }, "source": { "advisory": "cisco-sa-20190501-hyperflex-csrf", "defect": [ [ "CSCvk59399" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1857", "datePublished": "2019-05-03T16:40:23.067089Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:32:04.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-05-03 17:29
Modified
2024-11-21 04:37
Severity ?
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco HyperFlex HX-Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system by using a web browser and with the privileges of the user.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | hx220c_m5_firmware | 3.0\(1a\) | |
cisco | hx220c_m5 | - | |
cisco | hx240c_m5_firmware | 3.0\(1a\) | |
cisco | hx240c_m5 | - | |
cisco | hx240c_large_form_factor_firmware | 3.0\(1a\) | |
cisco | hx240c_large_form_factor | - | |
cisco | hx220c_all_nvme_m5_firmware | 3.0\(1a\) | |
cisco | hx220c_all_nvme_m5 | - | |
cisco | hx220c_af_m5_firmware | 3.0\(1a\) | |
cisco | hx220c_af_m5 | - | |
cisco | hx240c_af_m5_firmware | 3.0\(1a\) | |
cisco | hx240c_af_m5 | - | |
cisco | hx220c_edge_m5_firmware | 3.0\(1a\) | |
cisco | hx220c_edge_m5 | - | |
cisco | ucs_b200_m5_firmware | 3.0\(1a\) | |
cisco | ucs_b200_m5 | - | |
cisco | ucs_b480_m5_firmware | 3.0\(1a\) | |
cisco | ucs_b480_m5 | - | |
cisco | ucs_c480_m5_firmware | 3.0\(1a\) | |
cisco | ucs_c480_m5 | - | |
cisco | ucs_c125_m5_firmware | 3.0\(1a\) | |
cisco | ucs_c125_m5 | - | |
cisco | ucs_c220_m5_firmware | 3.0\(1a\) | |
cisco | ucs_c220_m5 | - | |
cisco | ucs_c240_m5_firmware | 3.0\(1a\) | |
cisco | ucs_c240_m5 | - | |
cisco | ucs_c480_ml_firmware | 3.0\(1a\) | |
cisco | ucs_c480_ml | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:hx220c_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C5C198A0-34DF-4237-9579-1395B05B9352", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:hx220c_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB126C9A-C926-436F-94AB-E7A4BA8EC8F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:hx240c_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "D33F42D5-0B40-4D5D-ABFB-D2024D6659C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:hx240c_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D96602B4-C017-4480-976E-38B9A7BB9B47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:hx240c_large_form_factor_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B0B0B68A-40FF-4436-A206-81039E476FA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:hx240c_large_form_factor:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E4B8B57-386B-461B-92C5-859298C5CE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:hx220c_all_nvme_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3431062-82CE-4E1B-A1BA-7EC439B9DD7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:hx220c_all_nvme_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC0DE157-7B81-4F8E-9F75-4324F7F64357", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:hx220c_af_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "58156CE8-E695-49B4-98F7-1603F905AB57", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:hx220c_af_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "224D5BE6-AC77-41B4-9533-8413DC060821", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:hx240c_af_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "760C8584-51F8-4A9A-9A9E-504EA14C091C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:hx240c_af_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CA7BE5B-90E9-4B86-B0B7-A265C94FB9BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:hx220c_edge_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "81D3B26E-428E-4EA8-B3CB-C46EF784C730", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:hx220c_edge_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B08E59-8B5B-4D03-A4D0-6180D64C9967", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ucs_b200_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BB2303C3-1AC3-4934-A622-E36CE82C17AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_b200_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C51F9FBE-4ACC-4979-B8EE-8CABC65D5477", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ucs_b480_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "06F57EE6-4F72-4412-96D2-4841DEE6B8FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_b480_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "989ABDEE-49FC-4CD7-82AA-2CCB53942C2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ucs_c480_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD062D9B-D02A-4012-A0F3-DDDBD3AB9947", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_c480_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D0B0FA5-996F-4F25-8AAB-603CB46175F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ucs_c125_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B3CFA537-40C6-47C6-916E-62CCE609670F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADD4A429-F168-460B-A964-8F1BD94C6387", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ucs_c220_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AE5DEFA9-4D1D-4469-84D0-FA694568F3D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_c220_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "855E1346-BACC-4485-9534-7C830FCFD54B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ucs_c240_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "242959AB-0566-443A-A065-F64D42A6207F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_c240_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "F262ADAB-74DC-466B-983A-C49E4BAC22C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ucs_c480_ml_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "38E05AD1-38AC-44B2-B7AD-45E86B66CCDF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_c480_ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A3FFE02-A5A8-4F0F-87C5-F7651F511074", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco HyperFlex HX-Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system by using a web browser and with the privileges of the user." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en la web de HyperFlex HX-Series de Cisco, podr\u00eda permitir a un atacante remoto no identificado dirija un ataque de tipo cross-site request forgery (CSRF) y ejecute acciones arbitrarias en un sistema afectado. La vulnerabilidad es debido a las insuficientes protecciones de CSRF para la interfaz de administraci\u00f3n basada en web del programa afectado. Un atacante podr\u00eda explotar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que siga un enlace creado. Una operaci\u00f3n \u00e9xito podr\u00eda permitir al atacante realizar acciones arbitrarias en un sistema afectado mediante el uso de un navegador web y con privilegios del usuario." } ], "id": "CVE-2019-1857", "lastModified": "2024-11-21T04:37:32.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-03T17:29:01.437", "references": [ { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/108163" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-hyperflex-csrf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/108163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-hyperflex-csrf" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }