Search criteria
9 vulnerabilities found for san_volume_controller_software by ibm
FKIE_CVE-2014-4811
Vulnerability from fkie_nvd - Published: 2014-09-12 01:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D1EB415E-0E3F-4CB7-A565-BEDBA1F2767C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "09583A2A-17B3-45BB-8407-807B520B1116",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "904E3322-AE92-4E5B-9113-38EB13AD4A6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "55915790-FF4F-413F-86F3-17E555EC4111",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EA23490B-9247-43AD-8DE0-1540331C9865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D38B4F8A-ACC9-4E6D-9AD0-5D6FB63FAC72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2B6FC5F1-7632-4769-9773-E884BCD473BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "36B8A601-8794-4170-BE36-9C5488C08C4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0D2F36C9-3FE9-4A9F-81B0-5C8F201B76A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7224320E-0576-45DA-A5B6-49C5E6905603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A591634C-4D3C-4EFF-AE9B-F40B418801DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FD597E3C-7F69-46A8-B26C-420360803ED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "62626CC1-07A1-4932-A1FF-769B62AE0F16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE906283-5CEA-496F-B402-A1BC107E6014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0328A41B-30D1-4257-958B-BF6B26B63BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "05C0724F-1E90-4CB7-9874-6CDC64542965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAB607A-537A-4F9C-91BB-7E8FFAF3763A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "024793B5-0283-4C7E-8D5C-13963FA48E95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6309B7-DCDD-409A-8CB2-31E8EA9CD2D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "57A82C4A-74AD-4E7C-9DE4-D865B85AF681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3B74E59F-9B31-4FE8-93A8-C6AE55AC6F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5BCE28A3-4299-465F-9345-4DBE2F3C5AB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A2531B05-9CBB-4544-A469-1205BDB81230",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "14BDEB64-3841-4FA7-B20A-59BA87CD1AFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0D3F5E-72BB-4DED-AD7F-AAB5D8D62775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2FEBA6-0C2D-4348-8E42-BBB149C671A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF4647B1-E9CD-4CD3-A8D8-F094F85FFA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C8587A38-B9B8-41A8-A1FE-85C48AE02118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "57FE10E8-378E-4EE4-ABBE-1CD3ADE1A81C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9E2D8C-4DFF-4A49-A791-97052E3F7977",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7D64878E-DA62-4832-9788-3447D1BDD085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B88F8FF9-1786-4D9A-B6F8-5AA31943EDFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC8E4B98-E236-440A-BCD8-3BCE7DBAC9C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F8C9303A-DBE7-4E35-9B31-5B68261C1D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4729D5AE-8FE4-433B-8A6D-B5910CDA097F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6B9469F3-1A77-452D-B2FB-1F4FF9851635",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3481BA96-DEA8-4C84-97FE-A21D4E0CC886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1AACA863-BDD0-435A-BD24-A0C6246D034D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0DC5BD8-C700-4A72-B31B-DF526B86713B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D24970E7-DFE9-4771-8F8D-6FAC469B406D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94780AF-B79A-417A-A144-A67CEC63C5F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A74D2B14-045E-404A-9853-775D3E14416C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EC47A4E4-6CD8-48BF-80B7-FFB6EE6CB9DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "208E3BF4-7721-4C71-AED6-7847A8DEBB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5EF61CC-F3D3-44D7-A584-2688AC9E8E34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "216B2D7C-819C-4788-99BD-FC9AEC1C4832",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "731522C8-9B1A-48CA-A3D6-399722BEFADF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CD1D2A83-B980-496E-A12A-254E3B2E8373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "94F70A64-24BB-4E53-BB64-6F541A9ADD48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA7FC6D-0E6D-4356-85FC-936088C5B44B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D1CA6669-8726-450A-A3DA-ABCD6845E545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BA102062-4992-4456-91F4-46B80FE500B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49318A1D-49F6-4CA7-AE31-0EB4B3790CBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address."
},
{
"lang": "es",
"value": "IBM Storwize 3500, 3700, 5000, y dispositivos 7000 y SAN Volume Controller 6.x y 7.x anterior a 7.2.0.8 permiten a atacantes remotos restablecer la contrase\u00f1a del superusuario administrador a su valor por defecto a trav\u00e9s de una solicitud directa hacia la direcci\u00f3n IP de administraci\u00f3n."
}
],
"id": "CVE-2014-4811",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-09-12T01:55:07.513",
"references": [
{
"source": "psirt@us.ibm.com",
"url": "http://secunia.com/advisories/61075"
},
{
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
},
{
"source": "psirt@us.ibm.com",
"url": "http://www.securityfocus.com/bid/69771"
},
{
"source": "psirt@us.ibm.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/61075"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/69771"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
}
],
"sourceIdentifier": "psirt@us.ibm.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-255"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-0880
Vulnerability from fkie_nvd - Published: 2014-03-29 01:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3C36EF-C35E-41B6-AF6C-F32D4AAB2DD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "33941722-CDAA-4008-BA8E-B0B9CA57F6E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8504EB-5E20-4D31-936E-BF5657BBCE17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7E4392F5-4235-49A4-ADBF-062D6B609717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8C4FCEBC-0037-4D0F-8A9E-2156FF7A0C74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E06C83C3-1BA8-4D5A-8E85-280C0D8E15D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FAEE7E92-9350-4975-88C7-9D73650FF9FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "272C88A1-A4E8-4EF9-AA69-E8182D3D8085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B07E61C5-7460-43B8-99F2-2B997F4D18B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3842D05A-E8DD-4059-A97B-DEC252AAF747",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6A726F20-F7F8-4BB0-A957-B13B740593F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE5B453-938D-4D0E-A73D-D1E031F252AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D71F79E2-FB50-4DEB-996F-A3C7C3DFA162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FBCBEB5F-F61C-4C60-A5CC-095B72E0A5AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "20E152F0-945E-4E62-8222-0CC867BACF1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "28E58505-A6C2-4EF7-8972-541B233E0EAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "51F2B0D2-338C-44E7-9572-0E6760DC2941",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "28E7387E-EC7A-4777-801A-D592F587187C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6691E037-5C4D-40FB-8780-ACC610DFB03D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AF4A7953-A5F9-489B-A3EC-5F906DE9A0BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "603B887B-9B61-4500-9522-3E5FF7911E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "581DC23E-1B96-4518-9927-46EE19D774F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B045357-3AC5-4665-AA0B-8EECE96170A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2FF67C-8913-4CE4-B02B-4851F5392DD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A41443-F351-4D16-9212-AC45F25472A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "312A73CE-27BF-483D-900A-EBFD1F61DD1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F64E8C-1813-4783-B3E9-1DB480BFFB88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16730D31-B760-4CE0-A781-7E19BED85148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B03BFA45-FFEE-4CE6-8A70-0A3998B0FB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "536CB2D2-01FE-482E-95AD-185A9450A5D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB9D8B3-112D-43C3-A3E9-2ED69F74CF51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FB7A26D6-FAE2-44C4-A724-2888D102B562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6674D7-4958-44A9-A3AD-215FAB054137",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "14D6CFC9-A13E-4B3D-93C3-55CC7D56B7C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "468940E2-EF8B-4E30-81D5-FD0756AA2465",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "62697D10-9439-4F3C-BE18-E472E70A69B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8738466C-00B4-421A-B767-E5D2E4E9AAF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "924011A4-5C61-4F2C-8EFA-B1A57F6DC8B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D49F200B-E095-4DBC-AE10-EB4018DF4C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5702E12D-0353-411B-987A-4D8B856F28D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6672F7-53B7-4B31-9B47-2EE932CA17DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8D3A88B4-B18B-454C-985A-CE7AD1807C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3935F99-783C-4F6F-957F-0469DF305592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "624A3B53-B175-4EEE-9921-8460E098A695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "12CCB16A-EFA1-45A0-97BF-A2F368113D78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DACA26CF-7C3F-4215-B032-ED9C5EFD57D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A78DD9B-A3E5-4D0D-AF20-3B38DA53AFCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8C1FE7-9130-4312-B5E0-866E8F18A42E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "15C5FC9F-10B7-4C75-A7F1-C65E1111AB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC8645C-48E3-4DD2-B957-65C0327ED640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "71DC07FE-7CBB-4832-B134-208355645FA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "01A2B74F-B526-4823-A01E-2B003CFD966E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "23352AFF-45E3-4321-82A1-C0491FCCAB80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "66339FDE-784B-4B57-9EAD-BEA87632B3F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "606F1E97-8D8F-49E4-9767-1E3AD7B0CFC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "147987EC-EE82-4FDB-B827-8519B1FE4973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "83F6BC04-C948-4C9B-9A5D-5AC16F658953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE1333C0-AF7D-4F0D-9B97-956C9DCCB947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "099199DC-6C70-4DB1-9C9F-9AD72D69CAC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0A3903-03CF-48AC-A7A0-B017094AF2D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "952F19BC-003C-41BC-B6AC-9FD4C2CE51EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "92792928-1B73-491C-A395-AD2CB9766B7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC166C78-C1D8-4C4B-89E1-40D464D99166",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "941A4E6C-4143-46DA-BFD3-7A3A9463DB0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49318A1D-49F6-4CA7-AE31-0EB4B3790CBB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4351CCF0-79FE-4725-B080-0013E993636E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1B34C10D-E04B-48FB-A25C-35E07C715F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5B6300-CCF2-4DF3-A428-4434436AF76D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "42EA6E91-FFB7-4A2D-9DE6-3DBC1B7B1C64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8B41926D-AECB-4F82-9433-0BB26E0FEDCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE8161F-2DC8-4219-8B1E-E51E5BDEAC5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DB619465-4165-4831-8476-927FD124A6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BF2CAA80-8FD2-424A-865D-E46F6F6693ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5264E7F-73A3-4315-A4C2-8EBFFE4941F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DE49FF35-4E86-4E63-B11E-D56DCC3BBB0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "52D79838-65C4-4E8D-84F9-13E477FFB5DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2D373E3B-0065-496D-9810-A7C0B848338F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B9E871D3-92DF-491F-BD86-B4C752A24601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0AE17C6B-127D-44F7-AA2F-C610ACA6A394",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC97C63B-9F2C-44FA-B0B0-CAB1710D27BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC051031-2AC5-4263-94BA-810F3AACF942",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "18B411DE-9EF0-453A-9FA2-2513AF7151B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D1EB415E-0E3F-4CB7-A565-BEDBA1F2767C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "09583A2A-17B3-45BB-8407-807B520B1116",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "904E3322-AE92-4E5B-9113-38EB13AD4A6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "55915790-FF4F-413F-86F3-17E555EC4111",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EA23490B-9247-43AD-8DE0-1540331C9865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D38B4F8A-ACC9-4E6D-9AD0-5D6FB63FAC72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2B6FC5F1-7632-4769-9773-E884BCD473BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "36B8A601-8794-4170-BE36-9C5488C08C4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0D2F36C9-3FE9-4A9F-81B0-5C8F201B76A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7224320E-0576-45DA-A5B6-49C5E6905603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A591634C-4D3C-4EFF-AE9B-F40B418801DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FD597E3C-7F69-46A8-B26C-420360803ED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "62626CC1-07A1-4932-A1FF-769B62AE0F16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE906283-5CEA-496F-B402-A1BC107E6014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0328A41B-30D1-4257-958B-BF6B26B63BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "05C0724F-1E90-4CB7-9874-6CDC64542965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAB607A-537A-4F9C-91BB-7E8FFAF3763A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "024793B5-0283-4C7E-8D5C-13963FA48E95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6309B7-DCDD-409A-8CB2-31E8EA9CD2D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "57A82C4A-74AD-4E7C-9DE4-D865B85AF681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3B74E59F-9B31-4FE8-93A8-C6AE55AC6F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5BCE28A3-4299-465F-9345-4DBE2F3C5AB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A2531B05-9CBB-4544-A469-1205BDB81230",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "14BDEB64-3841-4FA7-B20A-59BA87CD1AFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0D3F5E-72BB-4DED-AD7F-AAB5D8D62775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2FEBA6-0C2D-4348-8E42-BBB149C671A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF4647B1-E9CD-4CD3-A8D8-F094F85FFA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C8587A38-B9B8-41A8-A1FE-85C48AE02118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "57FE10E8-378E-4EE4-ABBE-1CD3ADE1A81C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9E2D8C-4DFF-4A49-A791-97052E3F7977",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7D64878E-DA62-4832-9788-3447D1BDD085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B88F8FF9-1786-4D9A-B6F8-5AA31943EDFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC8E4B98-E236-440A-BCD8-3BCE7DBAC9C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F8C9303A-DBE7-4E35-9B31-5B68261C1D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4729D5AE-8FE4-433B-8A6D-B5910CDA097F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6B9469F3-1A77-452D-B2FB-1F4FF9851635",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1AACA863-BDD0-435A-BD24-A0C6246D034D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0DC5BD8-C700-4A72-B31B-DF526B86713B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D24970E7-DFE9-4771-8F8D-6FAC469B406D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94780AF-B79A-417A-A144-A67CEC63C5F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A74D2B14-045E-404A-9853-775D3E14416C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EC47A4E4-6CD8-48BF-80B7-FFB6EE6CB9DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "208E3BF4-7721-4C71-AED6-7847A8DEBB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5EF61CC-F3D3-44D7-A584-2688AC9E8E34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "216B2D7C-819C-4788-99BD-FC9AEC1C4832",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "731522C8-9B1A-48CA-A3D6-399722BEFADF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D84487-CEBA-48A0-9B15-A0300D992E3D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6D13E364-FD0F-4E65-BEF4-B1E9BE96FA6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8D43D5FD-B6B0-4358-94B8-AF2B6E89BEB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "590B8B88-E7BF-4FCC-9ECF-2F9AEFB14BD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0145D583-2530-43E7-9F53-7333AB82D979",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B20CFFCE-FCC7-43B6-AAE5-B94D74529FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D000DC-DFFD-450B-A950-CB843AD49F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "55CE73A4-131E-473A-BFA6-CB0E254E2753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0596DADB-8DDD-4879-AAC7-FBA84ACFCEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D9C7D6-2FD4-4E5C-A902-9E6EC460C10F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
},
{
"lang": "es",
"value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000 y V7000; y Flex System V7000 con software 6.3 y 6.4 anterior a 6.4.1.8 y 7.1 y 7.2 anterior a 7.2.0.3, permite a atacantes remotos obtener acceso CLI, y como consecuencia causar una denegaci\u00f3n de servicio, a trav\u00e9s de trafico no especificado hacia la direcci\u00f3n IP administrativa."
}
],
"id": "CVE-2014-0880",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-03-29T01:55:07.047",
"references": [
{
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
},
{
"source": "psirt@us.ibm.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
}
],
"sourceIdentifier": "psirt@us.ibm.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-6354
Vulnerability from fkie_nvd - Published: 2013-02-19 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ibm | san_volume_controller_software | 6.1.0.0 | |
| ibm | san_volume_controller_software | 6.2.0.0 | |
| ibm | san_volume_controller_software | 6.3.0.0 | |
| ibm | san_volume_controller_software | 6.4.0.0 | |
| ibm | storwize_v7000 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A591634C-4D3C-4EFF-AE9B-F40B418801DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "024793B5-0283-4C7E-8D5C-13963FA48E95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets."
},
{
"lang": "es",
"value": "La interfaz de gesti\u00f3n en el controlador de volumen SAN IBM Storwize V7000 v6.x antes de v6.4.1.3 permite a atacantes remotos evitar la autenticaci\u00f3n y obtener acceso de superusuario a trav\u00e9s de paquetes IP."
}
],
"id": "CVE-2012-6354",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-02-19T19:55:00.880",
"references": [
{
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
},
{
"source": "psirt@us.ibm.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
}
],
"sourceIdentifier": "psirt@us.ibm.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-4811 (GCVE-0-2014-4811)
Vulnerability from cvelistv5 – Published: 2014-09-12 01:00 – Updated: 2024-08-06 11:27
VLAI?
Summary
IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:27:36.878Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
},
{
"name": "69771",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/69771"
},
{
"name": "61075",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61075"
},
{
"name": "ibm-storwize-cve20144811-superuser(95387)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-08-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
},
{
"name": "69771",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/69771"
},
{
"name": "61075",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61075"
},
{
"name": "ibm-storwize-cve20144811-superuser(95387)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-4811",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
},
{
"name": "69771",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69771"
},
{
"name": "61075",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61075"
},
{
"name": "ibm-storwize-cve20144811-superuser(95387)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2014-4811",
"datePublished": "2014-09-12T01:00:00",
"dateReserved": "2014-07-09T00:00:00",
"dateUpdated": "2024-08-06T11:27:36.878Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-0880 (GCVE-0-2014-0880)
Vulnerability from cvelistv5 – Published: 2014-03-29 01:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:27:20.284Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ibm-storwize-cve20140880-cli(91145)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"name": "ibm-storwize-cve20140880-cli(91145)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-0880",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ibm-storwize-cve20140880-cli(91145)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2014-0880",
"datePublished": "2014-03-29T01:00:00",
"dateReserved": "2014-01-06T00:00:00",
"dateUpdated": "2024-08-06T09:27:20.284Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-6354 (GCVE-0-2012-6354)
Vulnerability from cvelistv5 – Published: 2013-02-19 19:00 – Updated: 2024-08-06 21:28
VLAI?
Summary
The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:28:39.744Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
},
{
"name": "systemstorage-san-auth-bypass(80716)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-02-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
},
{
"name": "systemstorage-san-auth-bypass(80716)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2012-6354",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
},
{
"name": "systemstorage-san-auth-bypass(80716)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2012-6354",
"datePublished": "2013-02-19T19:00:00",
"dateReserved": "2012-12-16T00:00:00",
"dateUpdated": "2024-08-06T21:28:39.744Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-4811 (GCVE-0-2014-4811)
Vulnerability from nvd – Published: 2014-09-12 01:00 – Updated: 2024-08-06 11:27
VLAI?
Summary
IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:27:36.878Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
},
{
"name": "69771",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/69771"
},
{
"name": "61075",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61075"
},
{
"name": "ibm-storwize-cve20144811-superuser(95387)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-08-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
},
{
"name": "69771",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/69771"
},
{
"name": "61075",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61075"
},
{
"name": "ibm-storwize-cve20144811-superuser(95387)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-4811",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846"
},
{
"name": "69771",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69771"
},
{
"name": "61075",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61075"
},
{
"name": "ibm-storwize-cve20144811-superuser(95387)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2014-4811",
"datePublished": "2014-09-12T01:00:00",
"dateReserved": "2014-07-09T00:00:00",
"dateUpdated": "2024-08-06T11:27:36.878Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-0880 (GCVE-0-2014-0880)
Vulnerability from nvd – Published: 2014-03-29 01:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:27:20.284Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ibm-storwize-cve20140880-cli(91145)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"name": "ibm-storwize-cve20140880-cli(91145)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2014-0880",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ibm-storwize-cve20140880-cli(91145)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2014-0880",
"datePublished": "2014-03-29T01:00:00",
"dateReserved": "2014-01-06T00:00:00",
"dateUpdated": "2024-08-06T09:27:20.284Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-6354 (GCVE-0-2012-6354)
Vulnerability from nvd – Published: 2013-02-19 19:00 – Updated: 2024-08-06 21:28
VLAI?
Summary
The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:28:39.744Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
},
{
"name": "systemstorage-san-auth-bypass(80716)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-02-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
},
{
"name": "systemstorage-san-auth-bypass(80716)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2012-6354",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277"
},
{
"name": "systemstorage-san-auth-bypass(80716)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2012-6354",
"datePublished": "2013-02-19T19:00:00",
"dateReserved": "2012-12-16T00:00:00",
"dateUpdated": "2024-08-06T21:28:39.744Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}