All the vulnerabilites related to hpe - proliant_dl20_gen10_server
cve-2022-28628
Vulnerability from cvelistv5
Published
2022-08-11 17:16
Modified
2024-08-03 05:56
Severity ?
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.083Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:16:30",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28628",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28628",
    "datePublished": "2022-08-11T17:16:30",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.083Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28637
Vulnerability from cvelistv5
Published
2022-09-20 20:07
Modified
2024-08-03 05:56
Severity ?
Summary
A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.447Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.72"
            },
            {
              "status": "affected",
              "version": "unspecified"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local denial of service (DoS); potential local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-20T20:07:13",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28637",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.72"
                          },
                          {
                            "version_value": ""
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local denial of service (DoS); potential local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28637",
    "datePublished": "2022-09-20T20:07:13",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.447Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28626
Vulnerability from cvelistv5
Published
2022-08-11 17:16
Modified
2024-08-03 05:56
Severity ?
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A highly privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.109Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A highly privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:16:14",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28626",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A highly privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28626",
    "datePublished": "2022-08-11T17:16:14",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.109Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28639
Vulnerability from cvelistv5
Published
2022-09-20 20:06
Modified
2024-08-03 05:56
Severity ?
Summary
A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.403Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.72"
            },
            {
              "status": "affected",
              "version": "unspecified"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "remote potential adjacent denial of service (DoS); potential adjacent arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-20T20:06:05",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28639",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.72"
                          },
                          {
                            "version_value": ""
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "remote potential adjacent denial of service (DoS); potential adjacent arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28639",
    "datePublished": "2022-09-20T20:06:05",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-29213
Vulnerability from cvelistv5
Published
2021-11-01 13:17
Modified
2024-08-03 22:02
Severity ?
Summary
A potential local bypass of security restrictions vulnerability has been identified in HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server's system ROMs prior to version 2.52. The vulnerability could be locally exploited to cause disclosure of sensitive information, denial of service (DoS), and/or compromise system integrity.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:02:50.965Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04197en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE ProLiant ML30 Gen10 Server; HPE ProLiant DL20 Gen10 Server; HPE ProLiant MicroServer Gen10 Plus",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to system ROM v2.52"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential local bypass of security restrictions vulnerability has been identified in HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server\u0027s system ROMs prior to version 2.52. The vulnerability could be locally exploited to cause disclosure of sensitive information, denial of service (DoS), and/or compromise system integrity."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local bypass security restrictions; local compromise of system integrity; local denial of service (DoS); local disclosure of sensitive information",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-01T13:17:32",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04197en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2021-29213",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE ProLiant ML30 Gen10 Server; HPE ProLiant DL20 Gen10 Server; HPE ProLiant MicroServer Gen10 Plus",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to system ROM v2.52"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential local bypass of security restrictions vulnerability has been identified in HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server\u0027s system ROMs prior to version 2.52. The vulnerability could be locally exploited to cause disclosure of sensitive information, denial of service (DoS), and/or compromise system integrity."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local bypass security restrictions; local compromise of system integrity; local denial of service (DoS); local disclosure of sensitive information"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04197en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04197en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2021-29213",
    "datePublished": "2021-11-01T13:17:32",
    "dateReserved": "2021-03-25T00:00:00",
    "dateUpdated": "2024-08-03T22:02:50.965Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28630
Vulnerability from cvelistv5
Published
2022-08-11 17:17
Modified
2024-08-03 05:56
Severity ?
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality and integrity, and a partial loss of availability. User interaction is required to exploit this vulnerability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.012Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality and integrity, and a partial loss of availability. User interaction is required to exploit this vulnerability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:17:05",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28630",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality and integrity, and a partial loss of availability. User interaction is required to exploit this vulnerability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28630",
    "datePublished": "2022-08-11T17:17:05",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.012Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28635
Vulnerability from cvelistv5
Published
2022-08-11 17:18
Modified
2024-08-03 05:56
Severity ?
Summary
A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local arbitrary code execution and denial of service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:18:00",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28635",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local arbitrary code execution and denial of service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28635",
    "datePublished": "2022-08-11T17:18:00",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28632
Vulnerability from cvelistv5
Published
2022-08-11 17:17
Modified
2024-08-03 05:56
Severity ?
Summary
A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.184Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "adjacent arbitrary code execution and denial of service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:17:33",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28632",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "adjacent arbitrary code execution and denial of service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28632",
    "datePublished": "2022-08-11T17:17:33",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28633
Vulnerability from cvelistv5
Published
2022-08-11 17:18
Modified
2024-08-03 05:56
Severity ?
Summary
A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.040Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local disclosure of sensitive information and local unauthorized data modification",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:18:12",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28633",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local disclosure of sensitive information and local unauthorized data modification"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28633",
    "datePublished": "2022-08-11T17:18:12",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.040Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28636
Vulnerability from cvelistv5
Published
2022-08-11 17:17
Modified
2024-08-03 05:56
Severity ?
Summary
A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.445Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local arbitrary code execution and denial of service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:17:47",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28636",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local arbitrary code execution and denial of service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28636",
    "datePublished": "2022-08-11T17:17:47",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.445Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28634
Vulnerability from cvelistv5
Published
2022-08-11 17:18
Modified
2024-08-03 05:56
Severity ?
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A highly privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.229Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A highly privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:18:25",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28634",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A highly privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28634",
    "datePublished": "2022-08-11T17:18:25",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.229Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28640
Vulnerability from cvelistv5
Published
2022-09-20 20:01
Modified
2024-08-03 05:56
Severity ?
Summary
A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.403Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.72"
            },
            {
              "status": "affected",
              "version": "unspecified"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "potential local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-20T20:01:58",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28640",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.72"
                          },
                          {
                            "version_value": ""
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "potential local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28640",
    "datePublished": "2022-09-20T20:01:58",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-7205
Vulnerability from cvelistv5
Published
2020-07-30 17:27
Modified
2024-08-04 09:25
Severity ?
Summary
A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the "Boot Hole" issue for HPE signed GRUB2 applications.
Impacted products
Vendor Product Version
n/a HPE ProLiant BL460c Gen9 Server Blade Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant BL660c Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL180 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL60 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL80 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant ML110 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant ML150 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL740f Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL750f Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Apollo 4200 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL20 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL560 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant ML30 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant ML350 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL170r Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL190r Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL230a Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL250a Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL260a Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL450 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL730f Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a ProLiant SE2160w Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant m510 Server Cartridge Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant m710x Server Blade Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant BL460c Gen10 Server Blade Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL360 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL380 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL560 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL580 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant ML110 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant MicroServer Gen10 Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Synergy 480 Gen10 Compute Module Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Synergy 660 Gen10 Compute Module Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL180 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL160 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL120 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL270d Gen9 Special Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL385 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Synergy 660 Gen9 Compute Module Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Synergy 480 Gen9 Compute Module Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant WS460c Gen9 Graphics Server Blade Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HP ProLiant DL580 Gen8 Server Version: IP - Gen8 - Prior to 1.72
Version: SPP - Prior to Gen8.1. Scripting ToolKit - Prior to 11.40
n/a HPE Synergy 620 Gen9 Compute Module Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant ML350 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL580 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL360 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL170r Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL2100 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL2200 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL3100 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL3150 Gen10 Server (AMD) Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant ML10 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL120 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL380 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Service Pack for ProLiant Version: Prior to Version 2020.03.0
n/a HPE ProLiant DL160 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL270d Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL5800 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL5200 Gen9 Server Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL4100 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL3100 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Apollo 4200 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL325 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant ML30 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL20 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE StoreEasy 1000 Storage Gen9 Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE StoreEasy 1000 Storage Gen10 Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE SimpliVity 380 Gen10 Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE SimpliVity 2600 Gen10 Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL2600 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL2800 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant e910 Server Blade Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant m750 Server Blade Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant m710x-L Server Blade Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Cloudline CL5800 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant MicroServer Gen10 Plus Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL450 Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL230k Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL190r Gen10 Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE SmartStart Scripting Toolkit Software Version: Prior to Version 11.40
n/a HPE Apollo 2000 Gen10 Plus System Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL385 Gen10 Plus server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DL325 Gen10 Plus server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant DX385 Gen10 Plus server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL220n Gen10 Plus Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL290n Gen10 Plus Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE Synergy 480 Gen10 Plus Compute Module Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant XL925g Gen10 Plus 1U 4-node Configure-to-order Server Version: IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier
Version: v3.31
Version: v3.40
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
n/a HPE ProLiant e910t Server Blade Version: IP - Gen9 - Prior to 2.81
Version: SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T09:25:48.501Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04020en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HP Intelligent Provisioning",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Gen8 - Prior to 1.72"
            },
            {
              "status": "affected",
              "version": "Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "Gen10 and Gen10 Plus v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40."
            }
          ]
        },
        {
          "product": "HPE ProLiant BL460c Gen9 Server Blade",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant BL660c Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL180 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL60 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL80 Gen9 Server ",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant ML110 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant ML150 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL740f Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL750f Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Apollo 4200 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL20 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL560 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant ML30 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant ML350 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL170r Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL190r Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL230a Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL250a Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL260a Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL450 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL730f Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "ProLiant SE2160w Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant m510 Server Cartridge",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant m710x Server Blade",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant BL460c Gen10 Server Blade",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL360 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL380 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL560 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL580 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant ML110 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant MicroServer Gen10",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Synergy 480 Gen10 Compute Module",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Synergy 660 Gen10 Compute Module",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL180 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL160 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL120 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL270d Gen9 Special Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL385 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Synergy 660 Gen9 Compute Module",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Synergy 480 Gen9 Compute Module",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant WS460c Gen9 Graphics Server Blade",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HP ProLiant DL580 Gen8 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen8 - Prior to 1.72"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to Gen8.1. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Synergy 620 Gen9 Compute Module",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant ML350 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL580 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL360 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL170r Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL2100 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL2200 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL3100 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL3150 Gen10 Server (AMD)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant ML10 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL120 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL380 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Service Pack for ProLiant",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to Version 2020.03.0"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL160 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL270d Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL5800 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL5200 Gen9 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL4100 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL3100 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Apollo 4200 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL325 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant ML30 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL20 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE StoreEasy 1000 Storage Gen9",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE StoreEasy 1000 Storage Gen10",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE SimpliVity 380 Gen10",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE SimpliVity 2600 Gen10",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL2600 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL2800 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant e910 Server Blade",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant m750 Server Blade",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant m710x-L Server Blade",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Cloudline CL5800 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant MicroServer Gen10 Plus",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL450 Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL230k Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL190r Gen10 Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE SmartStart Scripting Toolkit Software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to Version 11.40"
            }
          ]
        },
        {
          "product": "HPE Apollo 2000 Gen10 Plus System",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL385 Gen10 Plus server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DL325 Gen10 Plus server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant DX385 Gen10 Plus server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL220n Gen10 Plus Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL290n Gen10 Plus Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE Synergy 480 Gen10 Plus Compute Module",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant XL925g Gen10 Plus 1U 4-node Configure-to-order Server",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
            },
            {
              "status": "affected",
              "version": "v3.31"
            },
            {
              "status": "affected",
              "version": "v3.40"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        },
        {
          "product": "HPE ProLiant e910t Server Blade",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "IP - Gen9 - Prior to 2.81"
            },
            {
              "status": "affected",
              "version": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the \"Boot Hole\" issue for HPE signed GRUB2 applications."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-30T17:27:10",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04020en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2020-7205",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HP Intelligent Provisioning",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Gen8 - Prior to 1.72"
                          },
                          {
                            "version_value": "Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "Gen10 and Gen10 Plus v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40."
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant BL460c Gen9 Server Blade",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant BL660c Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL180 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL60 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL80 Gen9 Server ",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant ML110 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant ML150 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL740f Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL750f Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Apollo 4200 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL20 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL560 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant ML30 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant ML350 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL170r Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL190r Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL230a Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL250a Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL260a Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL450 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL730f Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ProLiant SE2160w Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant m510 Server Cartridge",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant m710x Server Blade",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant BL460c Gen10 Server Blade",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL360 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL380 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL560 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL580 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant ML110 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant MicroServer Gen10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Synergy 480 Gen10 Compute Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Synergy 660 Gen10 Compute Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL180 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL160 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL120 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL270d Gen9 Special Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL385 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Synergy 660 Gen9 Compute Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Synergy 480 Gen9 Compute Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant WS460c Gen9 Graphics Server Blade",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HP ProLiant DL580 Gen8 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen8 - Prior to 1.72"
                          },
                          {
                            "version_value": "SPP - Prior to Gen8.1. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Synergy 620 Gen9 Compute Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant ML350 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL580 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL360 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL170r Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL2100 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL2200 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL3100 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL3150 Gen10 Server (AMD)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant ML10 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL120 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL380 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Service Pack for ProLiant",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to Version 2020.03.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL160 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL270d Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL5800 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL5200 Gen9 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL4100 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL3100 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Apollo 4200 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL325 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant ML30 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL20 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE StoreEasy 1000 Storage Gen9",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE StoreEasy 1000 Storage Gen10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE SimpliVity 380 Gen10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE SimpliVity 2600 Gen10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL2600 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL2800 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant e910 Server Blade",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant m750 Server Blade",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant m710x-L Server Blade",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Cloudline CL5800 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant MicroServer Gen10 Plus",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL450 Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL230k Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL190r Gen10 Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE SmartStart Scripting Toolkit Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to Version 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Apollo 2000 Gen10 Plus System",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL385 Gen10 Plus server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DL325 Gen10 Plus server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant DX385 Gen10 Plus server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL220n Gen10 Plus Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL290n Gen10 Plus Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE Synergy 480 Gen10 Plus Compute Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant XL925g Gen10 Plus 1U 4-node Configure-to-order Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen10 and Gen10 Plus Servers - v3.30 or earlier"
                          },
                          {
                            "version_value": "v3.31"
                          },
                          {
                            "version_value": "v3.40"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HPE ProLiant e910t Server Blade",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "IP - Gen9 - Prior to 2.81"
                          },
                          {
                            "version_value": "SPP - Prior to 2020.03. Scripting ToolKit - Prior to 11.40"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the \"Boot Hole\" issue for HPE signed GRUB2 applications."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04020en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04020en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2020-7205",
    "datePublished": "2020-07-30T17:27:10",
    "dateReserved": "2020-01-16T00:00:00",
    "dateUpdated": "2024-08-04T09:25:48.501Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28629
Vulnerability from cvelistv5
Published
2022-08-11 17:16
Modified
2024-08-03 05:56
Severity ?
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A low privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.130Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A low privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:16:53",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28629",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A low privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28629",
    "datePublished": "2022-08-11T17:16:53",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.130Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28631
Vulnerability from cvelistv5
Published
2022-08-11 17:17
Modified
2024-08-03 05:56
Severity ?
Summary
A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.092Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "adjacent arbitrary code execution and denial of service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:17:19",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28631",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "adjacent arbitrary code execution and denial of service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28631",
    "datePublished": "2022-08-11T17:17:19",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.092Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-46846
Vulnerability from cvelistv5
Published
2022-11-03 16:06
Modified
2024-08-04 05:17
Summary
Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.707Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04133en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "HPE Integrated Lights-Out 5",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.44"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eCross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.\u003c/p\u003e"
            }
          ],
          "value": "Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-12-12T12:11:04.548862Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04133en_us"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "cveClient/1.0.13"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2021-46846",
    "datePublished": "2022-11-03T16:06:09.815Z",
    "dateReserved": "2022-10-19T21:27:41.176Z",
    "dateUpdated": "2024-08-04T05:17:42.707Z",
    "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-30911
Vulnerability from cvelistv5
Published
2023-10-18 17:04
Modified
2024-09-13 17:29
Summary
HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:37:15.495Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-30911",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-13T17:29:30.659519Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-13T17:29:55.595Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "HPE Integrated Lights-Out",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThan": "iLO 5 v2.98",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "iLO 6 v1.53",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service."
            }
          ],
          "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-18T17:04:56.957Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2023-30911",
    "datePublished": "2023-10-18T17:04:35.447Z",
    "dateReserved": "2023-04-20T16:58:53.926Z",
    "dateUpdated": "2024-09-13T17:29:55.595Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28627
Vulnerability from cvelistv5
Published
2022-08-11 17:16
Modified
2024-08-03 05:56
Severity ?
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.043Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.71"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T17:16:41",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28627",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.71"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28627",
    "datePublished": "2022-08-11T17:16:41",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.043Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-28638
Vulnerability from cvelistv5
Published
2022-09-20 20:04
Modified
2024-08-03 05:56
Severity ?
Summary
An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:56:16.453Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HPE Integrated Lights-Out 5 (iLO 5)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to 2.72"
            },
            {
              "status": "affected",
              "version": "unspecified"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "isolated local disclosure of information; potential isolated local arbitrary code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-20T20:04:47",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2022-28638",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HPE Integrated Lights-Out 5 (iLO 5)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to 2.72"
                          },
                          {
                            "version_value": ""
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "isolated local disclosure of information; potential isolated local arbitrary code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us",
              "refsource": "MISC",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2022-28638",
    "datePublished": "2022-09-20T20:04:47",
    "dateReserved": "2022-04-04T00:00:00",
    "dateUpdated": "2024-08-03T05:56:16.453Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-28083
Vulnerability from cvelistv5
Published
2023-03-20 12:34
Modified
2024-08-02 12:30
Summary
A remote Cross-site Scripting vulnerability was discovered in HPE Integrated Lights-Out 6 (iLO 6), Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4). HPE has provided software updates to resolve this vulnerability in HPE Integrated Lights-Out.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T12:30:23.521Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04456en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "Integrated Lights-Out",
          "vendor": "HPE",
          "versions": [
            {
              "lessThan": "1.20",
              "status": "affected",
              "version": "Integrated Lights-Out 6 (iLO 6)",
              "versionType": "1.20"
            },
            {
              "lessThan": "2.78",
              "status": "affected",
              "version": "Integrated Lights-Out 5 (iLO 5) ",
              "versionType": "2.78"
            },
            {
              "lessThan": "2.82",
              "status": "affected",
              "version": "Integrated Lights-Out 4 (iLO 4)",
              "versionType": "2.82"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A remote Cross-site Scripting vulnerability was discovered in HPE Integrated Lights-Out 6 (iLO 6), Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4). HPE has provided software updates to resolve this vulnerability in HPE Integrated Lights-Out."
            }
          ],
          "value": "A remote Cross-site Scripting vulnerability was discovered in HPE Integrated Lights-Out 6 (iLO 6), Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4). HPE has provided software updates to resolve this vulnerability in HPE Integrated Lights-Out."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-03-22T04:39:47.581424Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04456en_us"
        }
      ],
      "source": {
        "advisory": "HPESBHF04456",
        "discovery": "UNKNOWN"
      },
      "title": "Potential Cross-Site scripting vulnerability in HPE Integrated Lights-Out 6 (iLO 6), Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4). ",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2023-28083",
    "datePublished": "2023-03-20T12:34:16.606Z",
    "dateReserved": "2023-03-10T14:47:44.211Z",
    "dateUpdated": "2024-08-02T12:30:23.521Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una divulgaci\u00f3n local de informaci\u00f3n confidencial y una vulnerabilidad local de modificaci\u00f3n de datos no autorizada en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\u00eda explotar localmente esta vulnerabilidad para leer y escribir en el sistema de archivos del firmware de iLO 5 resultando en una p\u00e9rdida completa de confidencialidad y una p\u00e9rdida parcial de integridad y disponibilidad. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28633",
  "lastModified": "2024-11-21T06:57:37.317",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 4.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.337",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-30 18:15
Modified
2024-11-21 05:36
Summary
A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the "Boot Hole" issue for HPE signed GRUB2 applications.
Impacted products
Vendor Product Version
hpe intelligent_provisioning *
hpe proliant_bl460c_gen8_blade_server -
hpe proliant_bl660c_gen8_blade_server -
hpe proliant_dl160_gen8_server -
hpe proliant_dl360e_gen8_server -
hpe proliant_dl360p_gen8_server -
hpe proliant_dl380e_gen8_server -
hpe proliant_dl380p_gen8_server -
hpe proliant_dl385p_gen8_server -
hpe proliant_dl560_gen8_server -
hpe proliant_dl580_gen8_server -
hpe proliant_ml310e_gen8_server -
hpe proliant_ml350e_gen8_server -
hpe proliant_ml350p_gen8_server -
hpe proliant_sl230s_gen8_server -
hpe proliant_sl250s_gen8_server -
hpe proliant_sl270s_gen8_server -
hpe proliant_sl4540_gen8_server -
hpe proliant_ws460c_gen8_graphics_server_blade -
hpe intelligent_provisioning *
hpe service_pack_for_proliant *
hpe smartstart_scripting_toolkit *
hpe apollo_4200_gen9_server -
hpe apollo_4520_chassis -
hpe cloudline_cl3100_gen9_server -
hpe cloudline_cl5200_gen9_server -
hpe cloudline_cl5800_gen9_server -
hpe proliant_bl460c_gen9_server_blade -
hpe proliant_bl660c_gen9_server_blade -
hpe proliant_dl120_gen9_server -
hpe proliant_dl160_gen9_server -
hpe proliant_dl180_gen9_server -
hpe proliant_dl20_gen9_server -
hpe proliant_dl360_gen9_server -
hpe proliant_dl380_gen9_server -
hpe proliant_dl388_gen9_server -
hpe proliant_dl560_gen9_server -
hpe proliant_dl580_gen9_server -
hpe proliant_dl60_gen9_server -
hpe proliant_dl80_gen9_server -
hpe proliant_e910_server_blade -
hpe proliant_m510_server_cartridge -
hpe proliant_m710x-l_server_blade -
hpe proliant_m710x_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_ml10_gen9_server -
hpe proliant_ml110_gen9_server -
hpe proliant_ml150_gen9_server -
hpe proliant_ml30_gen9_server -
hpe proliant_ml350_gen9_server -
hpe proliant_se2160w_gen9_server -
hpe proliant_ws460c_gen9_graphics_server_blade -
hpe proliant_xl170r_gen9_server -
hpe proliant_xl190r_gen9_server -
hpe proliant_xl230a_gen9_server -
hpe proliant_xl250a_gen9_server -
hpe proliant_xl260a_gen9_server -
hpe proliant_xl270d_gen9_server -
hpe proliant_xl450_gen9_server -
hpe proliant_xl730f_gen9_server -
hpe proliant_xl740f_gen9_server -
hpe proliant_xl750f_gen9_server -
hpe storeeasy_1000_storage_gen9 -
hpe synergy_480_gen9_compute_module -
hpe synergy_620_gen9_compute_module -
hpe synergy_660_gen9_compute_module -
hpe synergy_680_gen9_compute_module -
hpe synergy_d3940_storage_module -
hpe intelligent_provisioning *
hpe intelligent_provisioning 3.31
hpe intelligent_provisioning 3.40
hpe service_pack_for_proliant *
hpe smartstart_scripting_toolkit *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_system -
hpe cloudline_cl2100_gen10_server -
hpe cloudline_cl2200_gen10_server -
hpe cloudline_cl2600_gen10_server -
hpe cloudline_cl2800_gen10_server -
hpe cloudline_cl3100_gen10_server -
hpe cloudline_cl3150_gen10_server -
hpe cloudline_cl4100_gen10_server -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_microserver_gen10 -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl270d_gen9_special_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl2x260w_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe simplivity_2600_gen10 -
hpe simplivity_325_gen10 -
hpe simplivity_380_gen10 -
hpe storeeasy_1000_storage_gen10 -
hpe synergy_480_gen10_compute_module -
hpe synergy_480_gen10_plus_compute_module -
hpe synergy_660_gen10_compute_module -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "457F590D-983B-4E3D-ACD5-6803C0D133FE",
              "versionEndExcluding": "1.72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen8_blade_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BE3D597-87C8-4CA6-83F6-53F7717AE704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl660c_gen8_blade_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F591613-DFDF-449B-B10F-986B0465C881",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "346996C3-E131-4BE0-9261-E32D0567F795",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360e_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFFBB73F-EAF7-47A2-BD06-FC31172E05B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360p_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47779C63-CDE4-4BE6-96BA-CBD118E027ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380e_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7D81703-DB67-4650-959B-8787ED450AE3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380p_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE425FF-B87E-40D6-A85F-7740418B3A9F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385p_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "136BEE6B-E5C0-40DC-9789-19AB131A9030",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CED1122-4927-4665-8D6B-A6C986ED6252",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "407DB236-65BF-4B41-9C75-4D5BC246A905",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml310e_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7791C8B1-D949-4AEE-8BC5-40FECA8FBC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350e_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92436412-45F8-49EB-B02E-5405F21B42EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350p_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB075F0-2825-43F5-BA0A-8348A082580C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_sl230s_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6795F47-30A0-4433-96FD-808AAF536F45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_sl250s_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533312DC-3EB0-4F15-B7A6-BFCE5CFABC6C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_sl270s_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "361590CD-06A8-4BDF-9C24-053F31468A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_sl4540_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE3EB0B-7828-4383-A1CB-650B59C9F19F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ws460c_gen8_graphics_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD07DCA-B8AF-409F-A902-AE66CB450152",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F50030-ACB6-4C68-A256-F75679C61F71",
              "versionEndExcluding": "2.81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hpe:service_pack_for_proliant:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C739A64-40D4-4E05-B401-F9A8E23689A0",
              "versionEndExcluding": "2020.03.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hpe:smartstart_scripting_toolkit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "BAD81C97-029F-477F-B6D2-B212F5646238",
              "versionEndExcluding": "11.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C20D38E9-B2EA-4ECC-B9EC-D29BB249AC77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4520_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F3BD74-5F29-4EC3-9D05-53060D5439AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:cloudline_cl3100_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B1AB81-D2AB-4635-9C31-8A3435CA8DEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:cloudline_cl5200_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8BB0745-54DA-4792-B570-AE037E7C38D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:cloudline_cl5800_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "149886B8-4820-4D7F-ACA6-68FE3DE32D18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D230E7A-D852-4040-83CF-164AA3233F00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl660c_gen9_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "283E77B1-C09F-4A4F-A4ED-3CEED3F619F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6B65F98-15A8-48FA-A836-97430AF183EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1AD90B1-F95C-4A74-AAD5-684C0E0DCBC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E4F18F-55E2-4829-A1EF-881D06CC5481",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31223B01-2107-479B-AC77-1C31BBE2F96C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A65EC0-14C7-4838-913D-8EF11144A85B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F6D2D0-482F-4B2F-AF78-82BC56704E8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl388_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72B02E9-DE68-4923-835F-EE62AFDF6158",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2068295-B73A-4C01-8351-C2D8B957845B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3EB6796-FE83-42EB-84FF-F405289EE0B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F7E5C6-201B-4268-9CA7-13BBA1E74DF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CF640F8-B432-40DA-93C8-77D8351CB390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m510_server_cartridge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D32FDE1-231C-4B62-97C3-88902ABC9EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m710x-l_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D869E108-8DE7-4C90-A6B8-42A400F26595",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m710x_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A215D533-1739-43B9-B7C4-8F5012B64102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml10_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EDAC0B-39A9-41FF-99AA-66A4422EFE53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD3268D0-1F66-47BA-972C-21E809DC2F2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2703B986-0709-4D89-8CAF-7C3FB63D7D3F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E7C549-3A1B-40DE-A1FC-0BC62040E4C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BB05A81-BDF5-4D6C-B9E3-1894703F1CC3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_se2160w_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4587CAC-DED6-40CB-AC35-EA8E5650027E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66E10A5D-7C64-460A-9DBE-E5BCBBFDE6C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58AE85AC-1062-42E2-8142-9BC754D51035",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BA2C97-7AAB-4A55-B487-522715BDC80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA80708D-3219-4D54-B167-105DDEC5B85D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E62FEEB-A62D-42F4-A713-4CEAFF9B158E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl260a_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488E17A-78BE-4B1B-BB22-9800DA0BC0A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3844A137-DC09-4FEA-BB3F-CBC3E9046C6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CEE8B85-1F21-418F-B2D3-90151F6423BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C838C36-FFF2-4C90-8BF1-21984D6C9C88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl740f_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EBB97C-4A68-4276-BFF2-93D58F6F1CA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl750f_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "425FCBD4-A94B-4AE5-B002-258CE1FE97FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1000_storage_gen9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6394FEE7-9D5A-453D-815E-6EFCFFB04AF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29BE9486-493D-495E-8CFA-1E79FE57457C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "789F7158-51DE-4344-BD8A-1249BFE0158B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_660_gen9_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0163D6F2-5E24-4741-BEF3-7B671A10CA08",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CBAD3B0-D47D-4E05-96D1-28A989E118CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_d3940_storage_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A6DEE0-9327-4179-BEBA-2884B4070C7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA52CD1-7C72-449E-9F32-87279C4AAAFE",
              "versionEndIncluding": "3.30.213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hpe:intelligent_provisioning:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EEF7B6-4433-4214-B6F7-1621371D9DD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hpe:intelligent_provisioning:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A489940-ACCA-4B1F-869E-F9D4BC8176F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hpe:service_pack_for_proliant:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C739A64-40D4-4E05-B401-F9A8E23689A0",
              "versionEndExcluding": "2020.03.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hpe:smartstart_scripting_toolkit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "BAD81C97-029F-477F-B6D2-B212F5646238",
              "versionEndExcluding": "11.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:cloudline_cl2100_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A90ED4DF-0229-430D-A600-B2A777C73A4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:cloudline_cl2200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "739EDD3F-4955-4B2D-A8E8-A092FB10BEC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:cloudline_cl2600_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75304B66-21EA-4857-8B6C-B32D0457744A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:cloudline_cl2800_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C7A743B-F9E2-4B70-94C2-920F2B7D18E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:cloudline_cl3100_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB48BA1-2048-42F4-A195-F910B875196B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:cloudline_cl3150_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEDEF98-0D2B-4B9F-AAA6-305043D14F19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:cloudline_cl4100_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FD84248-F258-4F3A-BD05-E474FE7D6697",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A4A379-205A-479C-9C82-B182AEAEB8B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen9_special_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D87F1F6-28DA-433A-B43E-D105EE2B5EBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F58441-4DFB-42F3-AA93-500AAF712D1B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:simplivity_2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E80FF0-0B78-4F6C-AB11-0F3CAEDED7E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:simplivity_325_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CA0D40-ECCC-4252-8CC3-7A1816301F43",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:simplivity_380_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7642DB17-72A4-4762-900F-D4F3B8AEAB1D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1000_storage_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3D3EB14-1FB5-4080-8CA1-B5549DC2678E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "853AF641-B81C-4FB7-89AB-EACF420F0C62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F15301B-B695-4DC8-9EE5-517AC2E64778",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19188281-533B-450E-84F1-089F3300D08E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the \"Boot Hole\" issue for HPE signed GRUB2 applications."
    },
    {
      "lang": "es",
      "value": "Se identific\u00f3 una posible vulnerabilidad de seguridad en HPE Intelligent Provisioning, Service Pack para ProLiant y HPE Scripting ToolKit. La vulnerabilidad podr\u00eda ser explotada  localmente para permitir una ejecuci\u00f3n de c\u00f3digo arbitraria durante el proceso de arranque. ** Nota: ** Esta vulnerabilidad est\u00e1 relacionada con el uso de insmod en GRUB2 en el producto HPE afectado espec\u00edfico y HPE est\u00e1 abordando este problema. HPE ha realizado las siguientes actualizaciones de software e informaci\u00f3n de mitigaci\u00f3n para resolver la vulnerabilidad en Intelligent Provisioning, Service Pack para ProLiant y HPE Scripting ToolKit. HPE proporcion\u00f3 la \u00faltima versi\u00f3n de Intelligent Provisioning, Service Pack para ProLiant y HPE Scripting Toolkit, que incluye el parche de GRUB2 para resolver esta vulnerabilidad. Estas nuevas im\u00e1genes de arranque actualizar\u00e1n GRUB2 y la base de datos de firmas prohibidas (DBX). Una vez que la DBX est\u00e1 actualizada, los usuarios no ser\u00e1n capaces de iniciar desde el antiguo IP, SPP o Scripting ToolKit con Secure Boot habilitado. HPE ha proporcionado una herramienta de actualizaci\u00f3n DBX dedicada para trabajar con Microsoft Windows y sistemas operativos Linux compatibles. Estas herramientas puede ser usadas para actualizar la Forbidden Signature Database (DBX) desde el Sistema Operativo. **Nota:** Esta actualizaci\u00f3n de DBX mitiga el problema de GRUB2 con insmod habilitado y el problema \"Boot Hole\" para las aplicaciones GRUB2 firmadas por HPE"
    }
  ],
  "id": "CVE-2020-7205",
  "lastModified": "2024-11-21T05:36:49.470",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-30T18:15:11.737",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04020en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04020en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una potencial ejecuci\u00f3n local de c\u00f3digo arbitrario y una vulnerabilidad de denegaci\u00f3n de servicio (DoS) local dentro de un proceso aislado en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\u00eda explotar localmente esta vulnerabilidad para ejecutar potencialmente c\u00f3digo arbitrario en un proceso aislado resultando en una p\u00e9rdida completa de confidencialidad, integridad y disponibilidad dentro de ese proceso. Adem\u00e1s, un usuario no privilegiado podr\u00eda explotar una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en un proceso aislado resultando en una p\u00e9rdida completa de disponibilidad dentro de ese proceso. Un ataque con \u00e9xito depende de condiciones que est\u00e1n fuera del control de los atacantes. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28636",
  "lastModified": "2024-11-21T06:57:37.667",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.4,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.467",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A highly privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A highly privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una vulnerabilidad de ejecuci\u00f3n local de c\u00f3digo arbitrario en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario con altos privilegios podr\u00eda explotar localmente esta vulnerabilidad para ejecutar c\u00f3digo arbitrario resultando en una p\u00e9rdida completa de confidencialidad, integridad y disponibilidad. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28634",
  "lastModified": "2024-11-21T06:57:37.430",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.383",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-20 21:15
Modified
2024-11-21 06:57
Summary
An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hp apollo_4200_gen10_server -
hp apollo_4500 -
hp apollo_r2000_chassis -
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_plus_system -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe integrated_lights-out_5 -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3DF16F-EC27-4124-89B7-A580EF19D9EE",
              "versionEndExcluding": "2.72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7E4EA1D-8ACB-4C6C-AB96-80BC8FD71FB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B6BCFC-3AF2-4282-93F8-F64CE98FDC4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9311154A-E0EF-46B3-B8D0-6ED540029684",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "970779A7-00C5-4A06-89B1-717418934EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5370AF-C0B8-4E75-8B01-A4239B130E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una divulgaci\u00f3n local aislada de informaci\u00f3n y una posible vulnerabilidad local aislada de ejecuci\u00f3n de c\u00f3digo arbitrario que podr\u00eda conllevar a una p\u00e9rdida de confidencialidad, integridad y disponibilidad en HPE Integrated Lights-Out 5 (iLO 5), en Versi\u00f3n: 2.71, . Hewlett Packard Enterprise ha proporcionado un firmware actualizado para HPE Integrated Lights-Out 5 (iLO 5) que aborda estas vulnerabilidades de seguridad"
    }
  ],
  "id": "CVE-2022-28638",
  "lastModified": "2024-11-21T06:57:37.910",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-20T21:15:10.417",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-20 21:15
Modified
2024-11-21 06:57
Summary
A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hp apollo_4200_gen10_server -
hp apollo_4500 -
hp apollo_r2000_chassis -
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_plus_system -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe integrated_lights-out_5 -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3DF16F-EC27-4124-89B7-A580EF19D9EE",
              "versionEndExcluding": "2.72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7E4EA1D-8ACB-4C6C-AB96-80BC8FD71FB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B6BCFC-3AF2-4282-93F8-F64CE98FDC4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9311154A-E0EF-46B3-B8D0-6ED540029684",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "970779A7-00C5-4A06-89B1-717418934EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5370AF-C0B8-4E75-8B01-A4239B130E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio (DoS) local y de ejecuci\u00f3n de c\u00f3digo arbitrario local que podr\u00eda conllevar a una p\u00e9rdida de confidencialidad, integridad y disponibilidad en HPE Integrated Lights-Out 5 (iLO 5) en versi\u00f3n: 2.71. Hewlett Packard Enterprise ha proporcionado un firmware actualizado para HPE Integrated Lights-Out 5 (iLO 5) que aborda estas vulnerabilidades de seguridad"
    }
  ],
  "id": "CVE-2022-28637",
  "lastModified": "2024-11-21T06:57:37.790",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-20T21:15:10.377",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality and integrity, and a partial loss of availability. User interaction is required to exploit this vulnerability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality and integrity, and a partial loss of availability. User interaction is required to exploit this vulnerability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario local en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\u00eda explotar localmente esta vulnerabilidad para ejecutar c\u00f3digo arbitrario resultando en una p\u00e9rdida completa de confidencialidad e integridad, y una p\u00e9rdida parcial de disponibilidad. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28630",
  "lastModified": "2024-11-21T06:57:36.917",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.210",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una potencial ejecuci\u00f3n de c\u00f3digo arbitrario y una vulnerabilidad de denegaci\u00f3n de servicio (DoS) dentro de un proceso aislado en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\u00eda explotar esta vulnerabilidad en una red adyacente para ejecutar potencialmente c\u00f3digo arbitrario en un proceso aislado resultando en una p\u00e9rdida completa de confidencialidad, integridad y disponibilidad dentro de ese proceso. Adem\u00e1s, un usuario no privilegiado podr\u00eda explotar una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en un proceso aislado resultando en una p\u00e9rdida completa de disponibilidad dentro de ese proceso. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28632",
  "lastModified": "2024-11-21T06:57:37.153",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.297",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-03-22 06:15
Modified
2024-11-21 07:54
Summary
A remote Cross-site Scripting vulnerability was discovered in HPE Integrated Lights-Out 6 (iLO 6), Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4). HPE has provided software updates to resolve this vulnerability in HPE Integrated Lights-Out.
Impacted products
Vendor Product Version
hp integrated_lights-out_4 *
hpe apollo_4200_gen9_server -
hpe apollo_r2000_chassis -
hpe proliant_bl420c_gen8_server -
hpe proliant_bl460c_gen8_server_blade -
hpe proliant_bl460c_gen9_server_blade -
hpe proliant_bl465c_gen8_server_blade -
hpe proliant_bl660c_gen8_server_blade -
hpe proliant_bl660c_gen9_server -
hpe proliant_dl120_gen9_server -
hpe proliant_dl160_gen8_server -
hpe proliant_dl160_gen9_server -
hpe proliant_dl180_gen9_server -
hpe proliant_dl20_gen9_server -
hpe proliant_dl320e_gen8_server -
hpe proliant_dl320e_gen8_v2_server -
hpe proliant_dl360_gen9_server -
hpe proliant_dl360e_gen8_server -
hpe proliant_dl360p_gen8_server -
hpe proliant_dl380_gen9_server -
hpe proliant_dl380e_gen8_server -
hpe proliant_dl380p_gen8_server -
hpe proliant_dl385p_gen8_\(amd\) -
hpe proliant_dl560_gen8_server -
hpe proliant_dl560_gen9_server -
hpe proliant_dl580_gen8_server -
hpe proliant_dl580_gen9_server -
hpe proliant_dl60_gen9_server -
hpe proliant_dl80_gen9_server -
hpe proliant_microserver_gen8 -
hpe proliant_ml110_gen9_server -
hpe proliant_ml30_gen9_server -
hpe proliant_ml310e_gen8_server -
hpe proliant_ml310e_gen8_v2_server -
hpe proliant_ml350_gen9_server -
hpe proliant_ml350e_gen8_server -
hpe proliant_ml350e_gen8_v2_server -
hpe proliant_ml350p_gen8_server -
hpe proliant_sl210t_gen8_server -
hpe proliant_sl230s_gen8_server -
hpe proliant_sl250s_gen8_server -
hpe proliant_sl270s_gen8_se_server -
hpe proliant_sl270s_gen8_server -
hpe proliant_ws460c_gen8_graphics_server_blade -
hpe proliant_ws460c_gen9_graphics_server_blade -
hpe proliant_xl170r_gen9_server -
hpe proliant_xl190r_gen9_server -
hpe proliant_xl220a_gen8_v2_server -
hpe proliant_xl230a_gen9_server -
hpe proliant_xl230b_gen9_server -
hpe proliant_xl250a_gen9_server -
hpe proliant_xl270d_gen9_special_server -
hpe proliant_xl450_gen9_server -
hpe proliant_xl730f_gen9_server -
hpe proliant_xl740f_gen9_server -
hpe proliant_xl750f_gen9_server -
hpe storeeasy_1430_storage -
hpe storeeasy_1440_storage -
hpe storeeasy_1450_storage -
hpe storeeasy_1530_storage -
hpe storeeasy_1540_storage -
hpe storeeasy_1550_storage -
hpe storeeasy_1630_storage -
hpe storeeasy_1640_storage -
hpe storeeasy_1650_expanded_storage -
hpe storeeasy_1650_storage -
hpe storeeasy_1830_storage -
hpe storeeasy_1840_storage -
hpe storeeasy_1850_storage -
hpe storeeasy_3830_gateway_storage -
hpe storeeasy_3830_gateway_storage_blade -
hpe storeeasy_3840_gateway_storage -
hpe storeeasy_3840_gateway_storage_blade -
hpe storeeasy_3850_gateway_single_node_upgrade -
hpe storeeasy_3850_gateway_storage -
hpe storeeasy_3850_gateway_storage_blade -
hpe storevirtual_3000_file_controller -
hpe synergy_480_gen9_compute_module -
hpe synergy_620_gen9_compute_module -
hpe synergy_660_gen9_compute_module -
hpe synergy_680_gen9_compute_module -
hp integrated_lights-out_5 *
hpe apollo_4200_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2200_gen10 -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -
hpe synergy_480_gen10_compute_module -
hpe synergy_480_gen10_plus_compute_module -
hpe synergy_660_gen10_compute_module -
hp integrated_lights-out_6 *
hpe proliant_dl320_gen11_server -
hpe proliant_dl325_gen11_server -
hpe proliant_dl345_gen11_server -
hpe proliant_dl360_gen11_server -
hpe proliant_dl365_gen11_server -
hpe proliant_dl380_gen11_server -
hpe proliant_dl385_gen11_server -
hpe proliant_ml350_gen11_server -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:integrated_lights-out_4:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2AE4806-D70C-4D80-A898-405A3BC7D81C",
              "versionEndExcluding": "2.82",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C20D38E9-B2EA-4ECC-B9EC-D29BB249AC77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9724EB6-9693-4F0D-B507-B962D64B2E8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl420c_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E3C760C-2DAF-45CE-972B-B86D963B16BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen8_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B110E689-1823-42D6-91E6-81115A2CB048",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D230E7A-D852-4040-83CF-164AA3233F00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl465c_gen8_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C786E99-CDC8-4265-A05B-931602A4E10B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl660c_gen8_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91276F1E-6475-479D-857C-689E210116B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E685C0-E20A-4E95-A76F-8D18AF92C0F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6B65F98-15A8-48FA-A836-97430AF183EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "346996C3-E131-4BE0-9261-E32D0567F795",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1AD90B1-F95C-4A74-AAD5-684C0E0DCBC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E4F18F-55E2-4829-A1EF-881D06CC5481",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31223B01-2107-479B-AC77-1C31BBE2F96C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl320e_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51593FEE-B2A5-4642-8A3B-F0A7D85475AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl320e_gen8_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED8AE8A0-82CF-47E9-99F7-FFF1EF632C90",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34A65EC0-14C7-4838-913D-8EF11144A85B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360e_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFFBB73F-EAF7-47A2-BD06-FC31172E05B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360p_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47779C63-CDE4-4BE6-96BA-CBD118E027ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F6D2D0-482F-4B2F-AF78-82BC56704E8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380e_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7D81703-DB67-4650-959B-8787ED450AE3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380p_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE425FF-B87E-40D6-A85F-7740418B3A9F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385p_gen8_\\(amd\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07F1E3B5-02FF-4C46-825F-21D6ED76F6AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CED1122-4927-4665-8D6B-A6C986ED6252",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2068295-B73A-4C01-8351-C2D8B957845B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "407DB236-65BF-4B41-9C75-4D5BC246A905",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3EB6796-FE83-42EB-84FF-F405289EE0B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F7E5C6-201B-4268-9CA7-13BBA1E74DF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CF640F8-B432-40DA-93C8-77D8351CB390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDDEC65-E89C-47CA-9716-F4EB936ADE9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD3268D0-1F66-47BA-972C-21E809DC2F2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E7C549-3A1B-40DE-A1FC-0BC62040E4C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml310e_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7791C8B1-D949-4AEE-8BC5-40FECA8FBC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml310e_gen8_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBA3BC52-96CB-4F52-87BC-3E6DF13BD654",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BB05A81-BDF5-4D6C-B9E3-1894703F1CC3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350e_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92436412-45F8-49EB-B02E-5405F21B42EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350e_gen8_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3F92AE-CE88-4C38-AC00-6B56198D57F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350p_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB075F0-2825-43F5-BA0A-8348A082580C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_sl210t_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74F537C3-16DE-4F0C-9C38-6EE9504F841F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_sl230s_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6795F47-30A0-4433-96FD-808AAF536F45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_sl250s_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533312DC-3EB0-4F15-B7A6-BFCE5CFABC6C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_sl270s_gen8_se_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5067AA37-ED79-403B-953E-8EC4807A7067",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_sl270s_gen8_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "361590CD-06A8-4BDF-9C24-053F31468A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ws460c_gen8_graphics_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD07DCA-B8AF-409F-A902-AE66CB450152",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66E10A5D-7C64-460A-9DBE-E5BCBBFDE6C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58AE85AC-1062-42E2-8142-9BC754D51035",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BA2C97-7AAB-4A55-B487-522715BDC80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220a_gen8_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "056D1649-1670-465D-9E48-292B3F451521",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA80708D-3219-4D54-B167-105DDEC5B85D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230b_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE433CD5-FE98-4E41-9C18-4521DA23282F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E62FEEB-A62D-42F4-A713-4CEAFF9B158E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen9_special_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D87F1F6-28DA-433A-B43E-D105EE2B5EBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CEE8B85-1F21-418F-B2D3-90151F6423BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C838C36-FFF2-4C90-8BF1-21984D6C9C88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl740f_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EBB97C-4A68-4276-BFF2-93D58F6F1CA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl750f_gen9_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "425FCBD4-A94B-4AE5-B002-258CE1FE97FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1430_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "206854F1-5EBD-4073-9CF3-A54D8877212C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1440_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC48AAA-59FC-44CD-A8AB-2E0E965559EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1450_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAFBC1A4-A348-4FE2-B84D-6324DCAF163A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1530_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE21ED77-6606-46B3-9326-2C46B7EBD128",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1540_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "373A69DF-504E-4D4D-B646-E02958C7784F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1550_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B623A5-3771-405E-9F5C-174C0AC6E893",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1630_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F4AB82-4BDA-4859-A847-FBCFA7A15866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1640_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE943A0C-7359-4D61-9A10-4ADA92794BCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1650_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EAFDF1D-7EA9-4FFA-B552-97F8EC5581C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1650_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7F0EE22-6BA9-4ACD-BEE2-9F98C2E41961",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1830_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5235A8FE-9234-41FF-8CA1-36D3988D2756",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1840_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09BA82E3-5911-43F9-82F8-79D3D3C6A1E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1850_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F85603B-105D-4E25-973C-90A7EDAE6FF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_3830_gateway_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43ED3B2D-74D6-4EB5-85B8-6725FBA3D461",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_3830_gateway_storage_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C86C2B99-9DF0-4982-888C-57C8B3BEAEDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_3840_gateway_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "325C2A58-86B6-4F21-B7F2-72DE964AB612",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_3840_gateway_storage_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F939EF20-915C-4ADB-B6F8-62746ED2273D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_3850_gateway_single_node_upgrade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "170E15DB-9227-4323-891F-A914B6061F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_3850_gateway_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4623E31-E486-4303-9407-DD9680DFF09C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_3850_gateway_storage_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10D2BEE-E5CB-45B6-A836-849272070DCC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storevirtual_3000_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF7B8B24-E11A-4CC0-A2F3-D467BA58A6E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29BE9486-493D-495E-8CFA-1E79FE57457C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "789F7158-51DE-4344-BD8A-1249BFE0158B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_660_gen9_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0163D6F2-5E24-4741-BEF3-7B671A10CA08",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CBAD3B0-D47D-4E05-96D1-28A989E118CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:integrated_lights-out_5:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A9239CA-2FC4-456E-B1FD-5A5B174A1EB5",
              "versionEndExcluding": "2.78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2200_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3FF527B-51BF-445B-80D0-42FD50D6F60A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "853AF641-B81C-4FB7-89AB-EACF420F0C62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F15301B-B695-4DC8-9EE5-517AC2E64778",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19188281-533B-450E-84F1-089F3300D08E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:integrated_lights-out_6:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E81519FB-34FB-4FAC-B068-F821A18E4AA7",
              "versionEndExcluding": "1.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl320_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D01E2C9-76B7-4C23-A9B4-7BFB90F7F848",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B8A4A0C-A33A-48E5-8F53-807A20333DE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37DFB5BE-E36B-4D5D-AC60-267799B6AEF9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE19E0B8-B23C-41E0-82DA-BEFBCDC7954A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8E5A73F-96A5-4488-8DAE-3ECBEAD71CE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05AF31FE-6C42-4D64-A216-7FD5383D50F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36449636-2501-4608-968D-9E73090A4D43",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A24D0AE-55B8-438A-B956-3A20F34382F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A remote Cross-site Scripting vulnerability was discovered in HPE Integrated Lights-Out 6 (iLO 6), Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4). HPE has provided software updates to resolve this vulnerability in HPE Integrated Lights-Out."
    }
  ],
  "id": "CVE-2023-28083",
  "lastModified": "2024-11-21T07:54:22.000",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 8.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 6.0,
        "source": "security-alert@hpe.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-03-22T06:15:10.950",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04456en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04456en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security-alert@hpe.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-12-12 13:15
Modified
2024-11-21 06:34
Summary
Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.
Impacted products
Vendor Product Version
hp integrated_lights-out_5_firmware *
hp 3par_service_processor -
hp apollo_r2000_chassis -
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe integrated_lights-out_5 -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10 -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe storage_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D179C62-EA44-4D6F-B4ED-B5E9C1674FC1",
              "versionEndExcluding": "2.44",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:3par_service_processor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A9EB35E-D915-4C4E-81F5-8DAC3FD2336C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9311154A-E0EF-46B3-B8D0-6ED540029684",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5370AF-C0B8-4E75-8B01-A4239B130E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A4A379-205A-479C-9C82-B182AEAEB8B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5.\n\n"
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-Site Scripting en Hewlett Packard Enterprise Integrated Lights-Out 5."
    }
  ],
  "id": "CVE-2021-46846",
  "lastModified": "2024-11-21T06:34:47.993",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.5,
        "source": "security-alert@hpe.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-12-12T13:15:11.917",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04133en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04133en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-20 21:15
Modified
2024-11-21 06:57
Summary
A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hp apollo_4200_gen10_server -
hp apollo_4500 -
hp apollo_r2000_chassis -
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_plus_system -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe integrated_lights-out_5 -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3DF16F-EC27-4124-89B7-A580EF19D9EE",
              "versionEndExcluding": "2.72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7E4EA1D-8ACB-4C6C-AB96-80BC8FD71FB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B6BCFC-3AF2-4282-93F8-F64CE98FDC4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9311154A-E0EF-46B3-B8D0-6ED540029684",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "970779A7-00C5-4A06-89B1-717418934EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5370AF-C0B8-4E75-8B01-A4239B130E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una posible denegaci\u00f3n de servicio (DoS) remota y una posible vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario adyacente que podr\u00eda conllevar a una p\u00e9rdida de confidencialidad, integridad y disponibilidad en HPE Integrated Lights-Out 5 (iLO 5) en Versi\u00f3n: 2.71. Hewlett Packard Enterprise ha proporcionado un firmware actualizado para HPE Integrated Lights-Out 5 (iLO 5) que aborda estas vulnerabilidades de seguridad"
    }
  ],
  "id": "CVE-2022-28639",
  "lastModified": "2024-11-21T06:57:38.023",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-20T21:15:10.457",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential arbitrary code execution and a denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could exploit this vulnerability in an adjacent network to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una potencial ejecuci\u00f3n de c\u00f3digo arbitrario y una vulnerabilidad de denegaci\u00f3n de servicio (DoS) dentro de un proceso aislado en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\u00eda explotar esta vulnerabilidad en una red adyacente para ejecutar potencialmente c\u00f3digo arbitrario en un proceso aislado resultando en una p\u00e9rdida completa de confidencialidad, integridad y disponibilidad dentro de ese proceso. Adem\u00e1s, un usuario no privilegiado podr\u00eda explotar una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en un proceso aislado resultando en una p\u00e9rdida completa de disponibilidad dentro de ese proceso. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28631",
  "lastModified": "2024-11-21T06:57:37.030",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.253",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential local arbitrary code execution and a local denial of service (DoS) vulnerability within an isolated process were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to potentially execute arbitrary code in an isolated process resulting in a complete loss of confidentiality, integrity, and availability within that process. In addition, an unprivileged user could exploit a denial of service (DoS) vulnerability in an isolated process resulting in a complete loss of availability within that process. A successful attack depends on conditions beyond the attackers control. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una potencial ejecuci\u00f3n local de c\u00f3digo arbitrario y una vulnerabilidad de denegaci\u00f3n de servicio (DoS) local dentro de un proceso aislado en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\u00eda explotar localmente esta vulnerabilidad para ejecutar potencialmente c\u00f3digo arbitrario en un proceso aislado resultando en una p\u00e9rdida completa de confidencialidad, integridad y disponibilidad dentro de ese proceso. Adem\u00e1s, un usuario no privilegiado podr\u00eda explotar una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en un proceso aislado resultando en una p\u00e9rdida completa de disponibilidad dentro de ese proceso. Un ataque con \u00e9xito depende de condiciones que est\u00e1n fuera del control de los atacantes. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28635",
  "lastModified": "2024-11-21T06:57:37.547",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.4,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.423",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una vulnerabilidad de ejecuci\u00f3n local de c\u00f3digo arbitrario en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\u00eda explotar localmente esta vulnerabilidad para ejecutar c\u00f3digo arbitrario resultando en una p\u00e9rdida completa de confidencialidad, integridad y disponibilidad. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28628",
  "lastModified": "2024-11-21T06:57:36.683",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.123",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-20 21:15
Modified
2024-11-21 06:57
Summary
A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability.
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hp apollo_4200_gen10_server -
hp apollo_4500 -
hp apollo_r2000_chassis -
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_plus_system -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe integrated_lights-out_5 -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3DF16F-EC27-4124-89B7-A580EF19D9EE",
              "versionEndExcluding": "2.72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7E4EA1D-8ACB-4C6C-AB96-80BC8FD71FB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B6BCFC-3AF2-4282-93F8-F64CE98FDC4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9311154A-E0EF-46B3-B8D0-6ED540029684",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "970779A7-00C5-4A06-89B1-717418934EAA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5370AF-C0B8-4E75-8B01-A4239B130E9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una potencial vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario local adyacente que podr\u00eda conllevar a una p\u00e9rdida de confidencialidad, integridad y disponibilidad en HPE Integrated Lights-Out 5 (iLO 5) en versi\u00f3n: 2.71. Hewlett Packard Enterprise ha proporcionado un firmware actualizado para HPE Integrated Lights-Out 5 (iLO 5) que aborda esta vulnerabilidad de seguridad"
    }
  ],
  "id": "CVE-2022-28640",
  "lastModified": "2024-11-21T06:57:38.133",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-20T21:15:10.497",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04365en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-01 14:15
Modified
2024-11-21 06:00
Summary
A potential local bypass of security restrictions vulnerability has been identified in HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server's system ROMs prior to version 2.52. The vulnerability could be locally exploited to cause disclosure of sensitive information, denial of service (DoS), and/or compromise system integrity.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:proliant_microserver_gen10_plus_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08DDF386-6CE7-42D6-8457-5D38361A1874",
              "versionEndExcluding": "2.52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:proliant_ml30_gen10_server_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "418765BF-78A4-4178-B330-384082D8A37C",
              "versionEndExcluding": "2.52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:proliant_dl20_gen10_server_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "914E65E5-AEFB-4303-9361-3EAB1F123502",
              "versionEndExcluding": "2.52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential local bypass of security restrictions vulnerability has been identified in HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server\u0027s system ROMs prior to version 2.52. The vulnerability could be locally exploited to cause disclosure of sensitive information, denial of service (DoS), and/or compromise system integrity."
    },
    {
      "lang": "es",
      "value": "Se ha identificado una posible vulnerabilidad de evasi\u00f3n local de las restricciones de seguridad en HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server\u0027s system ROMs versiones anteriores a 2.52. La vulnerabilidad podr\u00eda ser explotada localmente para causar una divulgaci\u00f3n de informaci\u00f3n confidencial, la denegaci\u00f3n de servicio (DoS), y/o comprometer la integridad del sistema"
    }
  ],
  "id": "CVE-2021-29213",
  "lastModified": "2024-11-21T06:00:50.310",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-01T14:15:07.770",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04197en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04197en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A low privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A low privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una vulnerabilidad de ejecuci\u00f3n local de c\u00f3digo arbitrario en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\u00eda explotar localmente esta vulnerabilidad para ejecutar c\u00f3digo arbitrario resultando en una p\u00e9rdida completa de confidencialidad, integridad y disponibilidad. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28629",
  "lastModified": "2024-11-21T06:57:36.803",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.167",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-18 18:15
Modified
2024-11-21 08:01
Summary
HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_system -
hpe apollo_4200_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2200_gen10 -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_microserver_gen10_plus_v2 -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl2x260w_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe synergy_480_gen10_compute_module -
hpe synergy_480_gen10_plus_compute_module -
hpe synergy_660_gen10_compute_module -
hpe integrated_lights-out_6_firmware *
hpe alletra_4110 -
hpe alletra_4120 -
hpe alletra_4140 -
hpe proliant_dl110_gen11 -
hpe proliant_dl20_gen11 -
hpe proliant_dl320_gen11_server -
hpe proliant_dl325_gen11_server -
hpe proliant_dl345_gen11_server -
hpe proliant_dl360_gen11_server -
hpe proliant_dl365_gen11_server -
hpe proliant_dl380_gen11_server -
hpe proliant_dl380a_gen11 -
hpe proliant_dl385_gen11_server -
hpe proliant_dl560_gen11 -
hpe proliant_ml110_gen11 -
hpe proliant_ml30_gen11 -
hpe proliant_ml350_gen11_server -
hpe proliant_rl300_gen11 -
hpe synergy_480_gen11_compute_module -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAF9FFD1-73D6-40AD-849B-EB4749B5AAE3",
              "versionEndExcluding": "2.98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6135F141-E7EE-4DCE-988F-62F7B5815EBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2200_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3FF527B-51BF-445B-80D0-42FD50D6F60A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCB4EDC6-F7DA-4DCD-AB0B-BCCD5B4776DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F58441-4DFB-42F3-AA93-500AAF712D1B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "853AF641-B81C-4FB7-89AB-EACF420F0C62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F15301B-B695-4DC8-9EE5-517AC2E64778",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19188281-533B-450E-84F1-089F3300D08E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_6_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46E5BFA5-D47B-4D7D-9328-9210F5289934",
              "versionEndExcluding": "1.53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:alletra_4110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F66E9860-0CC6-4C51-9B1D-D56CBD1F231B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:alletra_4120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F95280DF-C0DD-4685-9F1E-5B8F2BA8CFD7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:alletra_4140:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB18DECF-4A39-4970-BE37-7C19818BD78A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3F028DB-68DF-4551-9D52-99D02F5DDBD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2378D39A-9737-4681-A724-1CF9B252D29E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl320_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D01E2C9-76B7-4C23-A9B4-7BFB90F7F848",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B8A4A0C-A33A-48E5-8F53-807A20333DE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37DFB5BE-E36B-4D5D-AC60-267799B6AEF9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE19E0B8-B23C-41E0-82DA-BEFBCDC7954A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8E5A73F-96A5-4488-8DAE-3ECBEAD71CE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05AF31FE-6C42-4D64-A216-7FD5383D50F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380a_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A576DB6-E28A-44F3-9D02-AB6DB197589D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36449636-2501-4608-968D-9E73090A4D43",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8E15353-5528-4630-87CE-1D1304C13E97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79E6B854-C81C-4D33-856F-6BBE7AA38863",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADDD6399-8558-4642-83FF-B0F8E370F549",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A24D0AE-55B8-438A-B956-3A20F34382F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_rl300_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEC202C6-AD3B-4C2C-9BA6-3F5356EF30AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen11_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF809BB7-50A7-4477-A627-D63A3AE5AA18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service."
    },
    {
      "lang": "es",
      "value": "HPE Integrated Lights-Out 5 e Integrated Lights-Out 6 que utilizan iLOrest pueden provocar una Denegaci\u00f3n de Servicio."
    }
  ],
  "id": "CVE-2023-30911",
  "lastModified": "2024-11-21T08:01:03.383",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 4.0,
        "source": "security-alert@hpe.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-18T18:15:09.033",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una vulnerabilidad de ejecuci\u00f3n local de c\u00f3digo arbitrario en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\u00eda explotar localmente esta vulnerabilidad para ejecutar c\u00f3digo arbitrario resultando en una p\u00e9rdida completa de confidencialidad, integridad y disponibilidad. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28627",
  "lastModified": "2024-11-21T06:57:36.570",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.080",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-12 15:15
Modified
2024-11-21 06:57
Summary
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A highly privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl120_gen10_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl325_gen10_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_dx170r_gen10_server -
hpe proliant_dx190r_gen10_server -
hpe proliant_dx220n_gen10_plus_server -
hpe proliant_dx325_gen10_plus_v2_server -
hpe proliant_dx360_gen10_plus_server -
hpe proliant_dx360_gen10_server -
hpe proliant_dx380_gen10_plus_server -
hpe proliant_dx380_gen10_server -
hpe proliant_dx385_gen10_plus_server -
hpe proliant_dx385_gen10_plus_v2_server -
hpe proliant_dx4200_gen10_server -
hpe proliant_dx560_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl420_gen10_server -
hpe proliant_xl450_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_server -
hpe storage_file_controller -
hpe storage_performance_file_controller -
hpe storeeasy_1460_storage -
hpe storeeasy_1560_storage -
hpe storeeasy_1660_expanded_storage -
hpe storeeasy_1660_performance_storage -
hpe storeeasy_1660_storage -
hpe storeeasy_1860_performance_storage -
hpe storeeasy_1860_storage -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50DE87E4-C7BA-45DF-A8D2-82278A87ECEA",
              "versionEndExcluding": "2.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03743177-70D4-442B-B59F-43912385CC83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5876FB45-B037-4355-BAE9-69157FD0A402",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93765BE7-D8C2-48C8-9ADA-A7C36B993D95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7591DA99-B0CA-4A23-A8C5-C6D9084C2329",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D176EE5-FDE7-475B-802A-AFD21A9F6E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B76D60-5493-4959-A85E-91C1D810365F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D9CF07-D08E-4B36-B25D-1011AF0463DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D8AA54-634D-4870-AC5E-BD8F70EDB83D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8464FB6E-5744-44B7-BD1F-87D8F382A30B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8768C-5E7D-4C11-8C49-182CC1D643B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594B767B-41AB-436A-AF2C-10185E1161F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "779A6A62-4357-46FF-9BA8-F53E657A4E31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00D29DB-B073-4C5A-934D-87A311D57657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5869DE25-F914-48E0-8AFF-72C463E99084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDA2E27-1E51-4DC3-A907-C6273168D366",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0700905D-BEA8-46A7-95D4-27BC3793FA51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCBE981-8F98-49B2-B09D-B0187D5DF322",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9E7335-3545-4F2D-A915-AB6B34EBB76D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC69BAD-3243-405F-839E-8BE9E2562205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386FE40-4223-4F35-A04A-84008B7A1B8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E86E62-1B51-4934-B8B6-40D920BE6192",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D34B52-2803-43B0-942A-F974CBE14531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFC53F93-901B-40A9-BAAD-DD5A8865E824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3A06978-A8B5-4251-955F-2DF206962605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82CC8E6-A017-406E-B993-4CFFEB230829",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A highly privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)."
    },
    {
      "lang": "es",
      "value": "Se ha detectado una vulnerabilidad de ejecuci\u00f3n local de c\u00f3digo arbitrario en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario con altos privilegios podr\u00eda explotar localmente esta vulnerabilidad para ejecutar c\u00f3digo arbitrario resultando en una p\u00e9rdida completa de confidencialidad, integridad y disponibilidad. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5)."
    }
  ],
  "id": "CVE-2022-28626",
  "lastModified": "2024-11-21T06:57:36.440",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-12T15:15:14.000",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}