Search criteria

9 vulnerabilities found for san_volume_controller_software by ibm

FKIE_CVE-2014-4811

Vulnerability from fkie_nvd - Published: 2014-09-12 01:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address.
Impacted products
Vendor Product Version
ibm san_volume_controller_software 6.1.0.0
ibm san_volume_controller_software 6.1.0.1
ibm san_volume_controller_software 6.1.0.2
ibm san_volume_controller_software 6.1.0.3
ibm san_volume_controller_software 6.1.0.4
ibm san_volume_controller_software 6.1.0.5
ibm san_volume_controller_software 6.1.0.6
ibm san_volume_controller_software 6.1.0.7
ibm san_volume_controller_software 6.1.0.8
ibm san_volume_controller_software 6.1.0.9
ibm san_volume_controller_software 6.1.0.10
ibm san_volume_controller_software 6.2.0.0
ibm san_volume_controller_software 6.2.0.1
ibm san_volume_controller_software 6.2.0.2
ibm san_volume_controller_software 6.2.0.3
ibm san_volume_controller_software 6.2.0.4
ibm san_volume_controller_software 6.2.0.5
ibm san_volume_controller_software 6.2.0.6
ibm san_volume_controller_software 6.3.0.0
ibm san_volume_controller_software 6.3.0.1
ibm san_volume_controller_software 6.3.0.2
ibm san_volume_controller_software 6.3.0.3
ibm san_volume_controller_software 6.3.0.4
ibm san_volume_controller_software 6.3.0.5
ibm san_volume_controller_software 6.3.0.6
ibm san_volume_controller_software 6.3.0.7
ibm san_volume_controller_software 6.4.0.0
ibm san_volume_controller_software 6.4.0.1
ibm san_volume_controller_software 6.4.0.2
ibm san_volume_controller_software 6.4.0.3
ibm san_volume_controller_software 6.4.0.4
ibm san_volume_controller_software 6.4.1.1
ibm san_volume_controller_software 6.4.1.2
ibm san_volume_controller_software 6.4.1.3
ibm san_volume_controller_software 6.4.1.4
ibm san_volume_controller_software 6.4.1.5
ibm san_volume_controller_software 6.4.1.6
ibm san_volume_controller_software 6.4.1.7
ibm san_volume_controller_software 6.4.1.8
ibm san_volume_controller_software 7.1.0.0
ibm san_volume_controller_software 7.1.0.1
ibm san_volume_controller_software 7.1.0.2
ibm san_volume_controller_software 7.1.0.3
ibm san_volume_controller_software 7.1.0.5
ibm san_volume_controller_software 7.1.0.6
ibm san_volume_controller_software 7.1.0.7
ibm san_volume_controller_software 7.2.0.0
ibm san_volume_controller_software 7.2.0.1
ibm san_volume_controller_software 7.2.0.2
ibm san_volume_controller_software 7.2.0.3
ibm san_volume_controller_software 7.2.0.4
ibm san_volume_controller_software 7.2.0.5
ibm san_volume_controller_software 7.2.0.6
ibm san_volume_controller_software 7.2.0.7
ibm storwize_v3500 -
ibm storwize_v3700 -
ibm storwize_v5000 -
ibm storwize_v7000 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1EB415E-0E3F-4CB7-A565-BEDBA1F2767C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "09583A2A-17B3-45BB-8407-807B520B1116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "904E3322-AE92-4E5B-9113-38EB13AD4A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "55915790-FF4F-413F-86F3-17E555EC4111",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA23490B-9247-43AD-8DE0-1540331C9865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D38B4F8A-ACC9-4E6D-9AD0-5D6FB63FAC72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6FC5F1-7632-4769-9773-E884BCD473BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "36B8A601-8794-4170-BE36-9C5488C08C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2F36C9-3FE9-4A9F-81B0-5C8F201B76A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7224320E-0576-45DA-A5B6-49C5E6905603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A591634C-4D3C-4EFF-AE9B-F40B418801DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD597E3C-7F69-46A8-B26C-420360803ED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "62626CC1-07A1-4932-A1FF-769B62AE0F16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE906283-5CEA-496F-B402-A1BC107E6014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0328A41B-30D1-4257-958B-BF6B26B63BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "05C0724F-1E90-4CB7-9874-6CDC64542965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FAB607A-537A-4F9C-91BB-7E8FFAF3763A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "024793B5-0283-4C7E-8D5C-13963FA48E95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC6309B7-DCDD-409A-8CB2-31E8EA9CD2D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "57A82C4A-74AD-4E7C-9DE4-D865B85AF681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B74E59F-9B31-4FE8-93A8-C6AE55AC6F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BCE28A3-4299-465F-9345-4DBE2F3C5AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2531B05-9CBB-4544-A469-1205BDB81230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "14BDEB64-3841-4FA7-B20A-59BA87CD1AFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D3F5E-72BB-4DED-AD7F-AAB5D8D62775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC2FEBA6-0C2D-4348-8E42-BBB149C671A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF4647B1-E9CD-4CD3-A8D8-F094F85FFA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8587A38-B9B8-41A8-A1FE-85C48AE02118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "57FE10E8-378E-4EE4-ABBE-1CD3ADE1A81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9E2D8C-4DFF-4A49-A791-97052E3F7977",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D64878E-DA62-4832-9788-3447D1BDD085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88F8FF9-1786-4D9A-B6F8-5AA31943EDFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC8E4B98-E236-440A-BCD8-3BCE7DBAC9C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8C9303A-DBE7-4E35-9B31-5B68261C1D7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4729D5AE-8FE4-433B-8A6D-B5910CDA097F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9469F3-1A77-452D-B2FB-1F4FF9851635",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3481BA96-DEA8-4C84-97FE-A21D4E0CC886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AACA863-BDD0-435A-BD24-A0C6246D034D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0DC5BD8-C700-4A72-B31B-DF526B86713B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D24970E7-DFE9-4771-8F8D-6FAC469B406D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94780AF-B79A-417A-A144-A67CEC63C5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A74D2B14-045E-404A-9853-775D3E14416C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC47A4E4-6CD8-48BF-80B7-FFB6EE6CB9DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "208E3BF4-7721-4C71-AED6-7847A8DEBB09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5EF61CC-F3D3-44D7-A584-2688AC9E8E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216B2D7C-819C-4788-99BD-FC9AEC1C4832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "731522C8-9B1A-48CA-A3D6-399722BEFADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD1D2A83-B980-496E-A12A-254E3B2E8373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F70A64-24BB-4E53-BB64-6F541A9ADD48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA7FC6D-0E6D-4356-85FC-936088C5B44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1CA6669-8726-450A-A3DA-ABCD6845E545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA102062-4992-4456-91F4-46B80FE500B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49318A1D-49F6-4CA7-AE31-0EB4B3790CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address."
    },
    {
      "lang": "es",
      "value": "IBM Storwize 3500, 3700, 5000, y dispositivos 7000 y SAN Volume Controller 6.x y 7.x anterior a 7.2.0.8 permiten a atacantes remotos restablecer la contrase\u00f1a del superusuario administrador a su valor por defecto a trav\u00e9s de una solicitud directa hacia la direcci\u00f3n IP de administraci\u00f3n."
    }
  ],
  "id": "CVE-2014-4811",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-09-12T01:55:07.513",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "url": "http://secunia.com/advisories/61075"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securityfocus.com/bid/69771"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/69771"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-0880

Vulnerability from fkie_nvd - Published: 2014-03-29 01:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.
Impacted products
Vendor Product Version
ibm storwize_v7000_software 6.3.0.0
ibm storwize_v7000_software 6.3.0.1
ibm storwize_v7000_software 6.3.0.2
ibm storwize_v7000_software 6.3.0.3
ibm storwize_v7000_software 6.3.0.4
ibm storwize_v7000_software 6.3.0.5
ibm storwize_v7000_software 6.3.0.6
ibm storwize_v7000_software 6.3.0.7
ibm storwize_v7000_software 6.4.0.0
ibm storwize_v7000_software 6.4.0.1
ibm storwize_v7000_software 6.4.0.2
ibm storwize_v7000_software 6.4.0.3
ibm storwize_v7000_software 6.4.0.4
ibm storwize_v7000_software 6.4.1.1
ibm storwize_v7000_software 6.4.1.2
ibm storwize_v7000_software 6.4.1.3
ibm storwize_v7000_software 6.4.1.4
ibm storwize_v7000_software 6.4.1.5
ibm storwize_v7000_software 6.4.1.6
ibm storwize_v7000_software 6.4.1.7
ibm storwize_v7000_software 7.1.0.0
ibm storwize_v7000_software 7.1.0.1
ibm storwize_v7000_software 7.1.0.2
ibm storwize_v7000_software 7.1.0.3
ibm storwize_v7000_software 7.1.0.5
ibm storwize_v7000_software 7.1.0.6
ibm storwize_v7000_software 7.1.0.7
ibm storwize_v7000_software 7.2.0.0
ibm storwize_v7000_software 7.2.0.1
ibm storwize_v7000_software 7.2.0.2
ibm storwize_v7000 -
ibm flex_system_v7000_software 6.4.1.2
ibm flex_system_v7000_software 6.4.1.3
ibm flex_system_v7000_software 6.4.1.4
ibm flex_system_v7000_software 6.4.1.5
ibm flex_system_v7000_software 6.4.1.6
ibm flex_system_v7000_software 6.4.1.7
ibm flex_system_v7000_software 7.1.0.1
ibm flex_system_v7000_software 7.1.0.2
ibm flex_system_v7000_software 7.1.0.3
ibm flex_system_v7000_software 7.1.0.5
ibm flex_system_v7000_software 7.1.0.6
ibm flex_system_v7000_software 7.1.0.7
ibm flex_system_v7000_software 7.2.0.0
ibm flex_system_v7000_software 7.2.0.1
ibm flex_system_v7000_software 7.2.0.2
ibm flex_system_v7000 -
ibm storwize_v3700_software 6.4.1.0
ibm storwize_v3700_software 6.4.1.1
ibm storwize_v3700_software 6.4.1.2
ibm storwize_v3700_software 6.4.1.3
ibm storwize_v3700_software 6.4.1.4
ibm storwize_v3700_software 6.4.1.5
ibm storwize_v3700_software 6.4.1.6
ibm storwize_v3700_software 6.4.1.7
ibm storwize_v3700_software 7.1.0.0
ibm storwize_v3700_software 7.1.0.1
ibm storwize_v3700_software 7.1.0.2
ibm storwize_v3700_software 7.1.0.3
ibm storwize_v3700_software 7.1.0.5
ibm storwize_v3700_software 7.1.0.6
ibm storwize_v3700_software 7.1.0.7
ibm storwize_v3700_software 7.2.0.0
ibm storwize_v3700_software 7.2.0.1
ibm storwize_v3700_software 7.2.0.2
ibm storwize_v3700 -
ibm storwize_v3500_software 6.4.1.0
ibm storwize_v3500_software 6.4.1.1
ibm storwize_v3500_software 6.4.1.2
ibm storwize_v3500_software 6.4.1.3
ibm storwize_v3500_software 6.4.1.4
ibm storwize_v3500_software 6.4.1.5
ibm storwize_v3500_software 6.4.1.6
ibm storwize_v3500_software 6.4.1.7
ibm storwize_v3500_software 7.1.0.0
ibm storwize_v3500_software 7.1.0.1
ibm storwize_v3500_software 7.1.0.2
ibm storwize_v3500_software 7.1.0.3
ibm storwize_v3500_software 7.1.0.5
ibm storwize_v3500_software 7.1.0.6
ibm storwize_v3500_software 7.2.0.0
ibm storwize_v3500_software 7.2.0.1
ibm storwize_v3500_software 7.2.0.2
ibm storwize_v3500 -
ibm san_volume_controller_software 6.1.0.0
ibm san_volume_controller_software 6.1.0.1
ibm san_volume_controller_software 6.1.0.2
ibm san_volume_controller_software 6.1.0.3
ibm san_volume_controller_software 6.1.0.4
ibm san_volume_controller_software 6.1.0.5
ibm san_volume_controller_software 6.1.0.6
ibm san_volume_controller_software 6.1.0.7
ibm san_volume_controller_software 6.1.0.8
ibm san_volume_controller_software 6.1.0.9
ibm san_volume_controller_software 6.1.0.10
ibm san_volume_controller_software 6.2.0.0
ibm san_volume_controller_software 6.2.0.1
ibm san_volume_controller_software 6.2.0.2
ibm san_volume_controller_software 6.2.0.3
ibm san_volume_controller_software 6.2.0.4
ibm san_volume_controller_software 6.2.0.5
ibm san_volume_controller_software 6.2.0.6
ibm san_volume_controller_software 6.3.0.0
ibm san_volume_controller_software 6.3.0.1
ibm san_volume_controller_software 6.3.0.2
ibm san_volume_controller_software 6.3.0.3
ibm san_volume_controller_software 6.3.0.4
ibm san_volume_controller_software 6.3.0.5
ibm san_volume_controller_software 6.3.0.6
ibm san_volume_controller_software 6.3.0.7
ibm san_volume_controller_software 6.4.0.0
ibm san_volume_controller_software 6.4.0.1
ibm san_volume_controller_software 6.4.0.2
ibm san_volume_controller_software 6.4.0.3
ibm san_volume_controller_software 6.4.0.4
ibm san_volume_controller_software 6.4.1.1
ibm san_volume_controller_software 6.4.1.2
ibm san_volume_controller_software 6.4.1.3
ibm san_volume_controller_software 6.4.1.4
ibm san_volume_controller_software 6.4.1.5
ibm san_volume_controller_software 6.4.1.6
ibm san_volume_controller_software 6.4.1.7
ibm san_volume_controller_software 7.1.0.0
ibm san_volume_controller_software 7.1.0.1
ibm san_volume_controller_software 7.1.0.2
ibm san_volume_controller_software 7.1.0.3
ibm san_volume_controller_software 7.1.0.5
ibm san_volume_controller_software 7.1.0.6
ibm san_volume_controller_software 7.1.0.7
ibm san_volume_controller_software 7.2.0.0
ibm san_volume_controller_software 7.2.0.1
ibm san_volume_controller_software 7.2.0.2
ibm san_volume_controller -
ibm storwize_v5000_software 7.1.0.2
ibm storwize_v5000_software 7.1.0.3
ibm storwize_v5000_software 7.1.0.4
ibm storwize_v5000_software 7.1.0.5
ibm storwize_v5000_software 7.1.0.6
ibm storwize_v5000_software 7.1.0.7
ibm storwize_v5000_software 7.2.0.0
ibm storwize_v5000_software 7.2.0.1
ibm storwize_v5000_software 7.2.0.2
ibm storwize_v5000 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3C36EF-C35E-41B6-AF6C-F32D4AAB2DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "33941722-CDAA-4008-BA8E-B0B9CA57F6E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8504EB-5E20-4D31-936E-BF5657BBCE17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E4392F5-4235-49A4-ADBF-062D6B609717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C4FCEBC-0037-4D0F-8A9E-2156FF7A0C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E06C83C3-1BA8-4D5A-8E85-280C0D8E15D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAEE7E92-9350-4975-88C7-9D73650FF9FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "272C88A1-A4E8-4EF9-AA69-E8182D3D8085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07E61C5-7460-43B8-99F2-2B997F4D18B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3842D05A-E8DD-4059-A97B-DEC252AAF747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A726F20-F7F8-4BB0-A957-B13B740593F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABE5B453-938D-4D0E-A73D-D1E031F252AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D71F79E2-FB50-4DEB-996F-A3C7C3DFA162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBCBEB5F-F61C-4C60-A5CC-095B72E0A5AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E152F0-945E-4E62-8222-0CC867BACF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E58505-A6C2-4EF7-8972-541B233E0EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "51F2B0D2-338C-44E7-9572-0E6760DC2941",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E7387E-EC7A-4777-801A-D592F587187C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6691E037-5C4D-40FB-8780-ACC610DFB03D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF4A7953-A5F9-489B-A3EC-5F906DE9A0BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "603B887B-9B61-4500-9522-3E5FF7911E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "581DC23E-1B96-4518-9927-46EE19D774F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B045357-3AC5-4665-AA0B-8EECE96170A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2FF67C-8913-4CE4-B02B-4851F5392DD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A41443-F351-4D16-9212-AC45F25472A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "312A73CE-27BF-483D-900A-EBFD1F61DD1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5F64E8C-1813-4783-B3E9-1DB480BFFB88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16730D31-B760-4CE0-A781-7E19BED85148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B03BFA45-FFEE-4CE6-8A70-0A3998B0FB62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "536CB2D2-01FE-482E-95AD-185A9450A5D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EB9D8B3-112D-43C3-A3E9-2ED69F74CF51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB7A26D6-FAE2-44C4-A724-2888D102B562",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6674D7-4958-44A9-A3AD-215FAB054137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "14D6CFC9-A13E-4B3D-93C3-55CC7D56B7C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "468940E2-EF8B-4E30-81D5-FD0756AA2465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "62697D10-9439-4F3C-BE18-E472E70A69B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8738466C-00B4-421A-B767-E5D2E4E9AAF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "924011A4-5C61-4F2C-8EFA-B1A57F6DC8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D49F200B-E095-4DBC-AE10-EB4018DF4C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5702E12D-0353-411B-987A-4D8B856F28D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D6672F7-53B7-4B31-9B47-2EE932CA17DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D3A88B4-B18B-454C-985A-CE7AD1807C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3935F99-783C-4F6F-957F-0469DF305592",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "624A3B53-B175-4EEE-9921-8460E098A695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "12CCB16A-EFA1-45A0-97BF-A2F368113D78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DACA26CF-7C3F-4215-B032-ED9C5EFD57D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A78DD9B-A3E5-4D0D-AF20-3B38DA53AFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE8C1FE7-9130-4312-B5E0-866E8F18A42E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C5FC9F-10B7-4C75-A7F1-C65E1111AB0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC8645C-48E3-4DD2-B957-65C0327ED640",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "71DC07FE-7CBB-4832-B134-208355645FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A2B74F-B526-4823-A01E-2B003CFD966E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "23352AFF-45E3-4321-82A1-C0491FCCAB80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "66339FDE-784B-4B57-9EAD-BEA87632B3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "606F1E97-8D8F-49E4-9767-1E3AD7B0CFC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "147987EC-EE82-4FDB-B827-8519B1FE4973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F6BC04-C948-4C9B-9A5D-5AC16F658953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE1333C0-AF7D-4F0D-9B97-956C9DCCB947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "099199DC-6C70-4DB1-9C9F-9AD72D69CAC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0A3903-03CF-48AC-A7A0-B017094AF2D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "952F19BC-003C-41BC-B6AC-9FD4C2CE51EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "92792928-1B73-491C-A395-AD2CB9766B7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC166C78-C1D8-4C4B-89E1-40D464D99166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "941A4E6C-4143-46DA-BFD3-7A3A9463DB0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49318A1D-49F6-4CA7-AE31-0EB4B3790CBB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4351CCF0-79FE-4725-B080-0013E993636E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B34C10D-E04B-48FB-A25C-35E07C715F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B5B6300-CCF2-4DF3-A428-4434436AF76D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EA6E91-FFB7-4A2D-9DE6-3DBC1B7B1C64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B41926D-AECB-4F82-9433-0BB26E0FEDCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEE8161F-2DC8-4219-8B1E-E51E5BDEAC5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB619465-4165-4831-8476-927FD124A6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF2CAA80-8FD2-424A-865D-E46F6F6693ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5264E7F-73A3-4315-A4C2-8EBFFE4941F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE49FF35-4E86-4E63-B11E-D56DCC3BBB0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "52D79838-65C4-4E8D-84F9-13E477FFB5DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D373E3B-0065-496D-9810-A7C0B848338F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E871D3-92DF-491F-BD86-B4C752A24601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AE17C6B-127D-44F7-AA2F-C610ACA6A394",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC97C63B-9F2C-44FA-B0B0-CAB1710D27BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC051031-2AC5-4263-94BA-810F3AACF942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18B411DE-9EF0-453A-9FA2-2513AF7151B4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1EB415E-0E3F-4CB7-A565-BEDBA1F2767C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "09583A2A-17B3-45BB-8407-807B520B1116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "904E3322-AE92-4E5B-9113-38EB13AD4A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "55915790-FF4F-413F-86F3-17E555EC4111",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA23490B-9247-43AD-8DE0-1540331C9865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D38B4F8A-ACC9-4E6D-9AD0-5D6FB63FAC72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6FC5F1-7632-4769-9773-E884BCD473BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "36B8A601-8794-4170-BE36-9C5488C08C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2F36C9-3FE9-4A9F-81B0-5C8F201B76A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7224320E-0576-45DA-A5B6-49C5E6905603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A591634C-4D3C-4EFF-AE9B-F40B418801DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD597E3C-7F69-46A8-B26C-420360803ED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "62626CC1-07A1-4932-A1FF-769B62AE0F16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE906283-5CEA-496F-B402-A1BC107E6014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0328A41B-30D1-4257-958B-BF6B26B63BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "05C0724F-1E90-4CB7-9874-6CDC64542965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FAB607A-537A-4F9C-91BB-7E8FFAF3763A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "024793B5-0283-4C7E-8D5C-13963FA48E95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC6309B7-DCDD-409A-8CB2-31E8EA9CD2D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "57A82C4A-74AD-4E7C-9DE4-D865B85AF681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B74E59F-9B31-4FE8-93A8-C6AE55AC6F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BCE28A3-4299-465F-9345-4DBE2F3C5AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2531B05-9CBB-4544-A469-1205BDB81230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "14BDEB64-3841-4FA7-B20A-59BA87CD1AFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D3F5E-72BB-4DED-AD7F-AAB5D8D62775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC2FEBA6-0C2D-4348-8E42-BBB149C671A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF4647B1-E9CD-4CD3-A8D8-F094F85FFA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8587A38-B9B8-41A8-A1FE-85C48AE02118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "57FE10E8-378E-4EE4-ABBE-1CD3ADE1A81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9E2D8C-4DFF-4A49-A791-97052E3F7977",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D64878E-DA62-4832-9788-3447D1BDD085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88F8FF9-1786-4D9A-B6F8-5AA31943EDFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC8E4B98-E236-440A-BCD8-3BCE7DBAC9C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8C9303A-DBE7-4E35-9B31-5B68261C1D7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4729D5AE-8FE4-433B-8A6D-B5910CDA097F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9469F3-1A77-452D-B2FB-1F4FF9851635",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AACA863-BDD0-435A-BD24-A0C6246D034D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0DC5BD8-C700-4A72-B31B-DF526B86713B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D24970E7-DFE9-4771-8F8D-6FAC469B406D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94780AF-B79A-417A-A144-A67CEC63C5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A74D2B14-045E-404A-9853-775D3E14416C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC47A4E4-6CD8-48BF-80B7-FFB6EE6CB9DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "208E3BF4-7721-4C71-AED6-7847A8DEBB09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5EF61CC-F3D3-44D7-A584-2688AC9E8E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216B2D7C-819C-4788-99BD-FC9AEC1C4832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "731522C8-9B1A-48CA-A3D6-399722BEFADF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5D84487-CEBA-48A0-9B15-A0300D992E3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D13E364-FD0F-4E65-BEF4-B1E9BE96FA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D43D5FD-B6B0-4358-94B8-AF2B6E89BEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "590B8B88-E7BF-4FCC-9ECF-2F9AEFB14BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0145D583-2530-43E7-9F53-7333AB82D979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20CFFCE-FCC7-43B6-AAE5-B94D74529FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8D000DC-DFFD-450B-A950-CB843AD49F19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "55CE73A4-131E-473A-BFA6-CB0E254E2753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0596DADB-8DDD-4879-AAC7-FBA84ACFCEE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4D9C7D6-2FD4-4E5C-A902-9E6EC460C10F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
    },
    {
      "lang": "es",
      "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000 y V7000; y Flex System V7000 con software 6.3 y 6.4 anterior a 6.4.1.8 y 7.1 y 7.2 anterior a 7.2.0.3, permite a atacantes remotos obtener acceso CLI, y como consecuencia causar una denegaci\u00f3n de servicio, a trav\u00e9s de trafico no especificado hacia la direcci\u00f3n IP administrativa."
    }
  ],
  "id": "CVE-2014-0880",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-03-29T01:55:07.047",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-6354

Vulnerability from fkie_nvd - Published: 2013-02-19 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A591634C-4D3C-4EFF-AE9B-F40B418801DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "024793B5-0283-4C7E-8D5C-13963FA48E95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets."
    },
    {
      "lang": "es",
      "value": "La interfaz de gesti\u00f3n en el controlador de volumen SAN IBM Storwize V7000 v6.x antes de v6.4.1.3 permite a atacantes remotos evitar la autenticaci\u00f3n y obtener acceso de superusuario a trav\u00e9s de paquetes IP."
    }
  ],
  "id": "CVE-2012-6354",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-19T19:55:00.880",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-4811 (GCVE-0-2014-4811)

Vulnerability from cvelistv5 – Published: 2014-09-12 01:00 – Updated: 2024-08-06 11:27
VLAI?
Summary
IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
ibm
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:27:36.878Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
          },
          {
            "name": "69771",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/69771"
          },
          {
            "name": "61075",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61075"
          },
          {
            "name": "ibm-storwize-cve20144811-superuser(95387)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-08-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
        },
        {
          "name": "69771",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/69771"
        },
        {
          "name": "61075",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61075"
        },
        {
          "name": "ibm-storwize-cve20144811-superuser(95387)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2014-4811",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
            },
            {
              "name": "69771",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/69771"
            },
            {
              "name": "61075",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61075"
            },
            {
              "name": "ibm-storwize-cve20144811-superuser(95387)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2014-4811",
    "datePublished": "2014-09-12T01:00:00",
    "dateReserved": "2014-07-09T00:00:00",
    "dateUpdated": "2024-08-06T11:27:36.878Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0880 (GCVE-0-2014-0880)

Vulnerability from cvelistv5 – Published: 2014-03-29 01:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
ibm
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:27:20.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ibm-storwize-cve20140880-cli(91145)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "ibm-storwize-cve20140880-cli(91145)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2014-0880",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ibm-storwize-cve20140880-cli(91145)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2014-0880",
    "datePublished": "2014-03-29T01:00:00",
    "dateReserved": "2014-01-06T00:00:00",
    "dateUpdated": "2024-08-06T09:27:20.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-6354 (GCVE-0-2012-6354)

Vulnerability from cvelistv5 – Published: 2013-02-19 19:00 – Updated: 2024-08-06 21:28
VLAI?
Summary
The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
ibm
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:28:39.744Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
          },
          {
            "name": "systemstorage-san-auth-bypass(80716)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-02-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
        },
        {
          "name": "systemstorage-san-auth-bypass(80716)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2012-6354",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
            },
            {
              "name": "systemstorage-san-auth-bypass(80716)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2012-6354",
    "datePublished": "2013-02-19T19:00:00",
    "dateReserved": "2012-12-16T00:00:00",
    "dateUpdated": "2024-08-06T21:28:39.744Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-4811 (GCVE-0-2014-4811)

Vulnerability from nvd – Published: 2014-09-12 01:00 – Updated: 2024-08-06 11:27
VLAI?
Summary
IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
ibm
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:27:36.878Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
          },
          {
            "name": "69771",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/69771"
          },
          {
            "name": "61075",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61075"
          },
          {
            "name": "ibm-storwize-cve20144811-superuser(95387)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-08-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
        },
        {
          "name": "69771",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/69771"
        },
        {
          "name": "61075",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61075"
        },
        {
          "name": "ibm-storwize-cve20144811-superuser(95387)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2014-4811",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
            },
            {
              "name": "69771",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/69771"
            },
            {
              "name": "61075",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61075"
            },
            {
              "name": "ibm-storwize-cve20144811-superuser(95387)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2014-4811",
    "datePublished": "2014-09-12T01:00:00",
    "dateReserved": "2014-07-09T00:00:00",
    "dateUpdated": "2024-08-06T11:27:36.878Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0880 (GCVE-0-2014-0880)

Vulnerability from nvd – Published: 2014-03-29 01:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
ibm
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:27:20.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ibm-storwize-cve20140880-cli(91145)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "ibm-storwize-cve20140880-cli(91145)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2014-0880",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ibm-storwize-cve20140880-cli(91145)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2014-0880",
    "datePublished": "2014-03-29T01:00:00",
    "dateReserved": "2014-01-06T00:00:00",
    "dateUpdated": "2024-08-06T09:27:20.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-6354 (GCVE-0-2012-6354)

Vulnerability from nvd – Published: 2013-02-19 19:00 – Updated: 2024-08-06 21:28
VLAI?
Summary
The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
ibm
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:28:39.744Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
          },
          {
            "name": "systemstorage-san-auth-bypass(80716)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-02-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
        },
        {
          "name": "systemstorage-san-auth-bypass(80716)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2012-6354",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
            },
            {
              "name": "systemstorage-san-auth-bypass(80716)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2012-6354",
    "datePublished": "2013-02-19T19:00:00",
    "dateReserved": "2012-12-16T00:00:00",
    "dateUpdated": "2024-08-06T21:28:39.744Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}