All the vulnerabilites related to hpe - proliant_dl380a_gen11
Vulnerability from fkie_nvd
Published
2023-10-18 18:15
Modified
2024-11-21 08:01
Summary
HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.
Impacted products
Vendor Product Version
hpe integrated_lights-out_5_firmware *
hpe apollo_2000_system -
hpe apollo_4200_gen10_plus_system -
hpe apollo_4200_gen10_server -
hpe apollo_4510_gen10_system -
hpe apollo_6500_gen10_plus_system -
hpe apollo_6500_gen10_system -
hpe apollo_n2600_gen10_plus -
hpe apollo_n2800_gen10_plus -
hpe apollo_r2200_gen10 -
hpe apollo_r2600_gen10 -
hpe apollo_r2800_gen10 -
hpe edgeline_e920_server_blade -
hpe edgeline_e920d_server_blade -
hpe edgeline_e920t_server_blade -
hpe proliant_bl460c_gen10_server_blade -
hpe proliant_dl110_gen10_plus_telco_server -
hpe proliant_dl160_gen10_server -
hpe proliant_dl180_gen10_server -
hpe proliant_dl20_gen10_plus_server -
hpe proliant_dl20_gen10_server -
hpe proliant_dl325_gen10_plus_server -
hpe proliant_dl325_gen10_plus_v2_server -
hpe proliant_dl345_gen10_plus_server -
hpe proliant_dl360_gen10_plus_server -
hpe proliant_dl360_gen10_server -
hpe proliant_dl365_gen10_plus_server -
hpe proliant_dl380_gen10_plus_server -
hpe proliant_dl380_gen10_server -
hpe proliant_dl385_gen10_plus_server -
hpe proliant_dl385_gen10_plus_v2_server -
hpe proliant_dl385_gen10_server -
hpe proliant_dl560_gen10_server -
hpe proliant_dl580_gen10_server -
hpe proliant_e910_server_blade -
hpe proliant_e910t_server_blade -
hpe proliant_m750_server_blade -
hpe proliant_microserver_gen10_plus -
hpe proliant_microserver_gen10_plus_v2 -
hpe proliant_ml110_gen10_server -
hpe proliant_ml30_gen10_plus_server -
hpe proliant_ml30_gen10_server -
hpe proliant_ml350_gen10_server -
hpe proliant_xl170r_gen10_server -
hpe proliant_xl190r_gen10_server -
hpe proliant_xl220n_gen10_plus_server -
hpe proliant_xl225n_gen10_plus_1u_node -
hpe proliant_xl230k_gen10_server -
hpe proliant_xl270d_gen10_server -
hpe proliant_xl290n_gen10_plus_server -
hpe proliant_xl2x260w_gen10_server -
hpe proliant_xl645d_gen10_plus_server -
hpe proliant_xl675d_gen10_plus_server -
hpe proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server -
hpe synergy_480_gen10_compute_module -
hpe synergy_480_gen10_plus_compute_module -
hpe synergy_660_gen10_compute_module -
hpe integrated_lights-out_6_firmware *
hpe alletra_4110 -
hpe alletra_4120 -
hpe alletra_4140 -
hpe proliant_dl110_gen11 -
hpe proliant_dl20_gen11 -
hpe proliant_dl320_gen11_server -
hpe proliant_dl325_gen11_server -
hpe proliant_dl345_gen11_server -
hpe proliant_dl360_gen11_server -
hpe proliant_dl365_gen11_server -
hpe proliant_dl380_gen11_server -
hpe proliant_dl380a_gen11 -
hpe proliant_dl385_gen11_server -
hpe proliant_dl560_gen11 -
hpe proliant_ml110_gen11 -
hpe proliant_ml30_gen11 -
hpe proliant_ml350_gen11_server -
hpe proliant_rl300_gen11 -
hpe synergy_480_gen11_compute_module -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAF9FFD1-73D6-40AD-849B-EB4749B5AAE3",
              "versionEndExcluding": "2.98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:apollo_2000_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6135F141-E7EE-4DCE-988F-62F7B5815EBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2200_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3FF527B-51BF-445B-80D0-42FD50D6F60A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCB4EDC6-F7DA-4DCD-AB0B-BCCD5B4776DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F58441-4DFB-42F3-AA93-500AAF712D1B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "853AF641-B81C-4FB7-89AB-EACF420F0C62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F15301B-B695-4DC8-9EE5-517AC2E64778",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19188281-533B-450E-84F1-089F3300D08E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hpe:integrated_lights-out_6_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46E5BFA5-D47B-4D7D-9328-9210F5289934",
              "versionEndExcluding": "1.53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hpe:alletra_4110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F66E9860-0CC6-4C51-9B1D-D56CBD1F231B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:alletra_4120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F95280DF-C0DD-4685-9F1E-5B8F2BA8CFD7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:alletra_4140:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB18DECF-4A39-4970-BE37-7C19818BD78A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3F028DB-68DF-4551-9D52-99D02F5DDBD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2378D39A-9737-4681-A724-1CF9B252D29E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl320_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D01E2C9-76B7-4C23-A9B4-7BFB90F7F848",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B8A4A0C-A33A-48E5-8F53-807A20333DE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37DFB5BE-E36B-4D5D-AC60-267799B6AEF9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE19E0B8-B23C-41E0-82DA-BEFBCDC7954A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8E5A73F-96A5-4488-8DAE-3ECBEAD71CE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05AF31FE-6C42-4D64-A216-7FD5383D50F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl380a_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A576DB6-E28A-44F3-9D02-AB6DB197589D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36449636-2501-4608-968D-9E73090A4D43",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8E15353-5528-4630-87CE-1D1304C13E97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79E6B854-C81C-4D33-856F-6BBE7AA38863",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADDD6399-8558-4642-83FF-B0F8E370F549",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen11_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A24D0AE-55B8-438A-B956-3A20F34382F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:proliant_rl300_gen11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEC202C6-AD3B-4C2C-9BA6-3F5356EF30AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hpe:synergy_480_gen11_compute_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF809BB7-50A7-4477-A627-D63A3AE5AA18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service."
    },
    {
      "lang": "es",
      "value": "HPE Integrated Lights-Out 5 e Integrated Lights-Out 6 que utilizan iLOrest pueden provocar una Denegaci\u00f3n de Servicio."
    }
  ],
  "id": "CVE-2023-30911",
  "lastModified": "2024-11-21T08:01:03.383",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 4.0,
        "source": "security-alert@hpe.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-18T18:15:09.033",
  "references": [
    {
      "source": "security-alert@hpe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us"
    }
  ],
  "sourceIdentifier": "security-alert@hpe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2023-30911
Vulnerability from cvelistv5
Published
2023-10-18 17:04
Modified
2024-09-13 17:29
Summary
HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:37:15.495Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-30911",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-13T17:29:30.659519Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-13T17:29:55.595Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "HPE Integrated Lights-Out",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThan": "iLO 5 v2.98",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "iLO 6 v1.53",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service."
            }
          ],
          "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-18T17:04:56.957Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2023-30911",
    "datePublished": "2023-10-18T17:04:35.447Z",
    "dateReserved": "2023-04-20T16:58:53.926Z",
    "dateUpdated": "2024-09-13T17:29:55.595Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}