All the vulnerabilites related to hpe - proliant_ml30_gen11
Vulnerability from fkie_nvd
Published
2023-10-18 18:15
Modified
2024-11-21 08:01
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF9FFD1-73D6-40AD-849B-EB4749B5AAE3", "versionEndExcluding": "2.98", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hpe:apollo_2000_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "6135F141-E7EE-4DCE-988F-62F7B5815EBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_r2200_gen10:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3FF527B-51BF-445B-80D0-42FD50D6F60A", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*", "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4EDC6-F7DA-4DCD-AB0B-BCCD5B4776DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F58441-4DFB-42F3-AA93-500AAF712D1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "853AF641-B81C-4FB7-89AB-EACF420F0C62", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F15301B-B695-4DC8-9EE5-517AC2E64778", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "19188281-533B-450E-84F1-089F3300D08E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hpe:integrated_lights-out_6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46E5BFA5-D47B-4D7D-9328-9210F5289934", "versionEndExcluding": "1.53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hpe:alletra_4110:-:*:*:*:*:*:*:*", "matchCriteriaId": "F66E9860-0CC6-4C51-9B1D-D56CBD1F231B", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:alletra_4120:-:*:*:*:*:*:*:*", "matchCriteriaId": "F95280DF-C0DD-4685-9F1E-5B8F2BA8CFD7", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:alletra_4140:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB18DECF-4A39-4970-BE37-7C19818BD78A", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen11:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3F028DB-68DF-4551-9D52-99D02F5DDBD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen11:-:*:*:*:*:*:*:*", "matchCriteriaId": "2378D39A-9737-4681-A724-1CF9B252D29E", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl320_gen11_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D01E2C9-76B7-4C23-A9B4-7BFB90F7F848", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen11_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B8A4A0C-A33A-48E5-8F53-807A20333DE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen11_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "37DFB5BE-E36B-4D5D-AC60-267799B6AEF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen11_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE19E0B8-B23C-41E0-82DA-BEFBCDC7954A", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen11_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8E5A73F-96A5-4488-8DAE-3ECBEAD71CE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen11_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "05AF31FE-6C42-4D64-A216-7FD5383D50F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl380a_gen11:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A576DB6-E28A-44F3-9D02-AB6DB197589D", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen11_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "36449636-2501-4608-968D-9E73090A4D43", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen11:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8E15353-5528-4630-87CE-1D1304C13E97", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen11:-:*:*:*:*:*:*:*", "matchCriteriaId": "79E6B854-C81C-4D33-856F-6BBE7AA38863", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen11:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADDD6399-8558-4642-83FF-B0F8E370F549", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen11_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A24D0AE-55B8-438A-B956-3A20F34382F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:proliant_rl300_gen11:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEC202C6-AD3B-4C2C-9BA6-3F5356EF30AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:synergy_480_gen11_compute_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF809BB7-50A7-4477-A627-D63A3AE5AA18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service." }, { "lang": "es", "value": "HPE Integrated Lights-Out 5 e Integrated Lights-Out 6 que utilizan iLOrest pueden provocar una Denegaci\u00f3n de Servicio." } ], "id": "CVE-2023-30911", "lastModified": "2024-11-21T08:01:03.383", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "security-alert@hpe.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-18T18:15:09.033", "references": [ { "source": "security-alert@hpe.com", "tags": [ "Vendor Advisory" ], "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us" } ], "sourceIdentifier": "security-alert@hpe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2023-30911
Vulnerability from cvelistv5
Published
2023-10-18 17:04
Modified
2024-09-13 17:29
Severity ?
EPSS score ?
Summary
HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Hewlett Packard Enterprise (HPE) | HPE Integrated Lights-Out |
Version: 0 ≤ Version: 0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:37:15.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-30911", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-13T17:29:30.659519Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T17:29:55.595Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HPE Integrated Lights-Out", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThan": "iLO 5 v2.98", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThan": "iLO 6 v1.53", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service." } ], "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-18T17:04:56.957Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-30911", "datePublished": "2023-10-18T17:04:35.447Z", "dateReserved": "2023-04-20T16:58:53.926Z", "dateUpdated": "2024-09-13T17:29:55.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }