All the vulnerabilites related to ibm - san_volume_controller_software
Vulnerability from fkie_nvd
Published
2014-03-29 01:55
Modified
2024-11-21 02:02
Severity ?
Summary
IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C3C36EF-C35E-41B6-AF6C-F32D4AAB2DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "33941722-CDAA-4008-BA8E-B0B9CA57F6E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B8504EB-5E20-4D31-936E-BF5657BBCE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4392F5-4235-49A4-ADBF-062D6B609717", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "8C4FCEBC-0037-4D0F-8A9E-2156FF7A0C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E06C83C3-1BA8-4D5A-8E85-280C0D8E15D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "FAEE7E92-9350-4975-88C7-9D73650FF9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "272C88A1-A4E8-4EF9-AA69-E8182D3D8085", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B07E61C5-7460-43B8-99F2-2B997F4D18B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3842D05A-E8DD-4059-A97B-DEC252AAF747", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6A726F20-F7F8-4BB0-A957-B13B740593F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "ABE5B453-938D-4D0E-A73D-D1E031F252AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "D71F79E2-FB50-4DEB-996F-A3C7C3DFA162", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBCBEB5F-F61C-4C60-A5CC-095B72E0A5AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "20E152F0-945E-4E62-8222-0CC867BACF1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "28E58505-A6C2-4EF7-8972-541B233E0EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "51F2B0D2-338C-44E7-9572-0E6760DC2941", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "28E7387E-EC7A-4777-801A-D592F587187C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "6691E037-5C4D-40FB-8780-ACC610DFB03D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "AF4A7953-A5F9-489B-A3EC-5F906DE9A0BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "603B887B-9B61-4500-9522-3E5FF7911E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "581DC23E-1B96-4518-9927-46EE19D774F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2B045357-3AC5-4665-AA0B-8EECE96170A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "EC2FF67C-8913-4CE4-B02B-4851F5392DD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F9A41443-F351-4D16-9212-AC45F25472A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "312A73CE-27BF-483D-900A-EBFD1F61DD1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "B5F64E8C-1813-4783-B3E9-1DB480BFFB88", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "16730D31-B760-4CE0-A781-7E19BED85148", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B03BFA45-FFEE-4CE6-8A70-0A3998B0FB62", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "536CB2D2-01FE-482E-95AD-185A9450A5D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1EB9D8B3-112D-43C3-A3E9-2ED69F74CF51", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB7A26D6-FAE2-44C4-A724-2888D102B562", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7F6674D7-4958-44A9-A3AD-215FAB054137", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "14D6CFC9-A13E-4B3D-93C3-55CC7D56B7C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "468940E2-EF8B-4E30-81D5-FD0756AA2465", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "62697D10-9439-4F3C-BE18-E472E70A69B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8738466C-00B4-421A-B767-E5D2E4E9AAF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "924011A4-5C61-4F2C-8EFA-B1A57F6DC8B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D49F200B-E095-4DBC-AE10-EB4018DF4C31", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "5702E12D-0353-411B-987A-4D8B856F28D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2D6672F7-53B7-4B31-9B47-2EE932CA17DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "8D3A88B4-B18B-454C-985A-CE7AD1807C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3935F99-783C-4F6F-957F-0469DF305592", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "624A3B53-B175-4EEE-9921-8460E098A695", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "12CCB16A-EFA1-45A0-97BF-A2F368113D78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DACA26CF-7C3F-4215-B032-ED9C5EFD57D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A78DD9B-A3E5-4D0D-AF20-3B38DA53AFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE8C1FE7-9130-4312-B5E0-866E8F18A42E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "15C5FC9F-10B7-4C75-A7F1-C65E1111AB0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CEC8645C-48E3-4DD2-B957-65C0327ED640", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "71DC07FE-7CBB-4832-B134-208355645FA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "01A2B74F-B526-4823-A01E-2B003CFD966E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "23352AFF-45E3-4321-82A1-C0491FCCAB80", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "66339FDE-784B-4B57-9EAD-BEA87632B3F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "606F1E97-8D8F-49E4-9767-1E3AD7B0CFC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "147987EC-EE82-4FDB-B827-8519B1FE4973", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "83F6BC04-C948-4C9B-9A5D-5AC16F658953", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DE1333C0-AF7D-4F0D-9B97-956C9DCCB947", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "099199DC-6C70-4DB1-9C9F-9AD72D69CAC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "7A0A3903-03CF-48AC-A7A0-B017094AF2D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "952F19BC-003C-41BC-B6AC-9FD4C2CE51EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "92792928-1B73-491C-A395-AD2CB9766B7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC166C78-C1D8-4C4B-89E1-40D464D99166", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "941A4E6C-4143-46DA-BFD3-7A3A9463DB0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "49318A1D-49F6-4CA7-AE31-0EB4B3790CBB", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4351CCF0-79FE-4725-B080-0013E993636E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B34C10D-E04B-48FB-A25C-35E07C715F43", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B5B6300-CCF2-4DF3-A428-4434436AF76D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "42EA6E91-FFB7-4A2D-9DE6-3DBC1B7B1C64", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8B41926D-AECB-4F82-9433-0BB26E0FEDCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AEE8161F-2DC8-4219-8B1E-E51E5BDEAC5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "DB619465-4165-4831-8476-927FD124A6E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "BF2CAA80-8FD2-424A-865D-E46F6F6693ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5264E7F-73A3-4315-A4C2-8EBFFE4941F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE49FF35-4E86-4E63-B11E-D56DCC3BBB0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "52D79838-65C4-4E8D-84F9-13E477FFB5DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "2D373E3B-0065-496D-9810-A7C0B848338F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B9E871D3-92DF-491F-BD86-B4C752A24601", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0AE17C6B-127D-44F7-AA2F-C610ACA6A394", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC97C63B-9F2C-44FA-B0B0-CAB1710D27BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC051031-2AC5-4263-94BA-810F3AACF942", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "18B411DE-9EF0-453A-9FA2-2513AF7151B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D1EB415E-0E3F-4CB7-A565-BEDBA1F2767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "09583A2A-17B3-45BB-8407-807B520B1116", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "904E3322-AE92-4E5B-9113-38EB13AD4A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "55915790-FF4F-413F-86F3-17E555EC4111", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EA23490B-9247-43AD-8DE0-1540331C9865", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D38B4F8A-ACC9-4E6D-9AD0-5D6FB63FAC72", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "2B6FC5F1-7632-4769-9773-E884BCD473BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "36B8A601-8794-4170-BE36-9C5488C08C4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0D2F36C9-3FE9-4A9F-81B0-5C8F201B76A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "7224320E-0576-45DA-A5B6-49C5E6905603", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A591634C-4D3C-4EFF-AE9B-F40B418801DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD597E3C-7F69-46A8-B26C-420360803ED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "62626CC1-07A1-4932-A1FF-769B62AE0F16", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AE906283-5CEA-496F-B402-A1BC107E6014", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0328A41B-30D1-4257-958B-BF6B26B63BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "05C0724F-1E90-4CB7-9874-6CDC64542965", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2FAB607A-537A-4F9C-91BB-7E8FFAF3763A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "024793B5-0283-4C7E-8D5C-13963FA48E95", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC6309B7-DCDD-409A-8CB2-31E8EA9CD2D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "57A82C4A-74AD-4E7C-9DE4-D865B85AF681", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "3B74E59F-9B31-4FE8-93A8-C6AE55AC6F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BCE28A3-4299-465F-9345-4DBE2F3C5AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "A2531B05-9CBB-4544-A469-1205BDB81230", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "14BDEB64-3841-4FA7-B20A-59BA87CD1AFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D3F5E-72BB-4DED-AD7F-AAB5D8D62775", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC2FEBA6-0C2D-4348-8E42-BBB149C671A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF4647B1-E9CD-4CD3-A8D8-F094F85FFA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8587A38-B9B8-41A8-A1FE-85C48AE02118", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "57FE10E8-378E-4EE4-ABBE-1CD3ADE1A81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE9E2D8C-4DFF-4A49-A791-97052E3F7977", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7D64878E-DA62-4832-9788-3447D1BDD085", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B88F8FF9-1786-4D9A-B6F8-5AA31943EDFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "AC8E4B98-E236-440A-BCD8-3BCE7DBAC9C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F8C9303A-DBE7-4E35-9B31-5B68261C1D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "4729D5AE-8FE4-433B-8A6D-B5910CDA097F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "6B9469F3-1A77-452D-B2FB-1F4FF9851635", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AACA863-BDD0-435A-BD24-A0C6246D034D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0DC5BD8-C700-4A72-B31B-DF526B86713B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D24970E7-DFE9-4771-8F8D-6FAC469B406D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94780AF-B79A-417A-A144-A67CEC63C5F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "A74D2B14-045E-404A-9853-775D3E14416C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EC47A4E4-6CD8-48BF-80B7-FFB6EE6CB9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "208E3BF4-7721-4C71-AED6-7847A8DEBB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5EF61CC-F3D3-44D7-A584-2688AC9E8E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "216B2D7C-819C-4788-99BD-FC9AEC1C4832", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "731522C8-9B1A-48CA-A3D6-399722BEFADF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5D84487-CEBA-48A0-9B15-A0300D992E3D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6D13E364-FD0F-4E65-BEF4-B1E9BE96FA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D43D5FD-B6B0-4358-94B8-AF2B6E89BEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "590B8B88-E7BF-4FCC-9ECF-2F9AEFB14BD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0145D583-2530-43E7-9F53-7333AB82D979", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B20CFFCE-FCC7-43B6-AAE5-B94D74529FC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "F8D000DC-DFFD-450B-A950-CB843AD49F19", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "55CE73A4-131E-473A-BFA6-CB0E254E2753", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0596DADB-8DDD-4879-AAC7-FBA84ACFCEE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4D9C7D6-2FD4-4E5C-A902-9E6EC460C10F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address." }, { "lang": "es", "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000 y V7000; y Flex System V7000 con software 6.3 y 6.4 anterior a 6.4.1.8 y 7.1 y 7.2 anterior a 7.2.0.3, permite a atacantes remotos obtener acceso CLI, y como consecuencia causar una denegaci\u00f3n de servicio, a trav\u00e9s de trafico no especificado hacia la direcci\u00f3n IP administrativa." } ], "id": "CVE-2014-0880", "lastModified": "2024-11-21T02:02:58.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-29T01:55:07.047", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570" }, { "source": "psirt@us.ibm.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-02-19 19:55
Modified
2024-11-21 01:46
Severity ?
Summary
The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | san_volume_controller_software | 6.1.0.0 | |
ibm | san_volume_controller_software | 6.2.0.0 | |
ibm | san_volume_controller_software | 6.3.0.0 | |
ibm | san_volume_controller_software | 6.4.0.0 | |
ibm | storwize_v7000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A591634C-4D3C-4EFF-AE9B-F40B418801DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "024793B5-0283-4C7E-8D5C-13963FA48E95", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets." }, { "lang": "es", "value": "La interfaz de gesti\u00f3n en el controlador de volumen SAN IBM Storwize V7000 v6.x antes de v6.4.1.3 permite a atacantes remotos evitar la autenticaci\u00f3n y obtener acceso de superusuario a trav\u00e9s de paquetes IP." } ], "id": "CVE-2012-6354", "lastModified": "2024-11-21T01:46:03.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-19T19:55:00.880", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277" }, { "source": "psirt@us.ibm.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-09-12 01:55
Modified
2024-11-21 02:10
Severity ?
Summary
IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D1EB415E-0E3F-4CB7-A565-BEDBA1F2767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "09583A2A-17B3-45BB-8407-807B520B1116", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "904E3322-AE92-4E5B-9113-38EB13AD4A6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "55915790-FF4F-413F-86F3-17E555EC4111", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EA23490B-9247-43AD-8DE0-1540331C9865", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D38B4F8A-ACC9-4E6D-9AD0-5D6FB63FAC72", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "2B6FC5F1-7632-4769-9773-E884BCD473BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "36B8A601-8794-4170-BE36-9C5488C08C4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0D2F36C9-3FE9-4A9F-81B0-5C8F201B76A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "7224320E-0576-45DA-A5B6-49C5E6905603", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A591634C-4D3C-4EFF-AE9B-F40B418801DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD597E3C-7F69-46A8-B26C-420360803ED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "62626CC1-07A1-4932-A1FF-769B62AE0F16", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AE906283-5CEA-496F-B402-A1BC107E6014", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0328A41B-30D1-4257-958B-BF6B26B63BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "05C0724F-1E90-4CB7-9874-6CDC64542965", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2FAB607A-537A-4F9C-91BB-7E8FFAF3763A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "024793B5-0283-4C7E-8D5C-13963FA48E95", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC6309B7-DCDD-409A-8CB2-31E8EA9CD2D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "57A82C4A-74AD-4E7C-9DE4-D865B85AF681", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "3B74E59F-9B31-4FE8-93A8-C6AE55AC6F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BCE28A3-4299-465F-9345-4DBE2F3C5AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "A2531B05-9CBB-4544-A469-1205BDB81230", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "14BDEB64-3841-4FA7-B20A-59BA87CD1AFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D3F5E-72BB-4DED-AD7F-AAB5D8D62775", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC2FEBA6-0C2D-4348-8E42-BBB149C671A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF4647B1-E9CD-4CD3-A8D8-F094F85FFA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8587A38-B9B8-41A8-A1FE-85C48AE02118", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "57FE10E8-378E-4EE4-ABBE-1CD3ADE1A81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE9E2D8C-4DFF-4A49-A791-97052E3F7977", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7D64878E-DA62-4832-9788-3447D1BDD085", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B88F8FF9-1786-4D9A-B6F8-5AA31943EDFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "AC8E4B98-E236-440A-BCD8-3BCE7DBAC9C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F8C9303A-DBE7-4E35-9B31-5B68261C1D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "4729D5AE-8FE4-433B-8A6D-B5910CDA097F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "6B9469F3-1A77-452D-B2FB-1F4FF9851635", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3481BA96-DEA8-4C84-97FE-A21D4E0CC886", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AACA863-BDD0-435A-BD24-A0C6246D034D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0DC5BD8-C700-4A72-B31B-DF526B86713B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D24970E7-DFE9-4771-8F8D-6FAC469B406D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94780AF-B79A-417A-A144-A67CEC63C5F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "A74D2B14-045E-404A-9853-775D3E14416C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EC47A4E4-6CD8-48BF-80B7-FFB6EE6CB9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "208E3BF4-7721-4C71-AED6-7847A8DEBB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5EF61CC-F3D3-44D7-A584-2688AC9E8E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "216B2D7C-819C-4788-99BD-FC9AEC1C4832", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "731522C8-9B1A-48CA-A3D6-399722BEFADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD1D2A83-B980-496E-A12A-254E3B2E8373", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "94F70A64-24BB-4E53-BB64-6F541A9ADD48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "BFA7FC6D-0E6D-4356-85FC-936088C5B44B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D1CA6669-8726-450A-A3DA-ABCD6845E545", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA102062-4992-4456-91F4-46B80FE500B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "49318A1D-49F6-4CA7-AE31-0EB4B3790CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address." }, { "lang": "es", "value": "IBM Storwize 3500, 3700, 5000, y dispositivos 7000 y SAN Volume Controller 6.x y 7.x anterior a 7.2.0.8 permiten a atacantes remotos restablecer la contrase\u00f1a del superusuario administrador a su valor por defecto a trav\u00e9s de una solicitud directa hacia la direcci\u00f3n IP de administraci\u00f3n." } ], "id": "CVE-2014-4811", "lastModified": "2024-11-21T02:10:54.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-09-12T01:55:07.513", "references": [ { "source": "psirt@us.ibm.com", "url": "http://secunia.com/advisories/61075" }, { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846" }, { "source": "psirt@us.ibm.com", "url": "http://www.securityfocus.com/bid/69771" }, { "source": "psirt@us.ibm.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2014-4811
Vulnerability from cvelistv5
Published
2014-09-12 01:00
Modified
2024-08-06 11:27
Severity ?
EPSS score ?
Summary
IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address.
References
▼ | URL | Tags |
---|---|---|
http://www.ibm.com/support/docview.wss?uid=ssg1S1004846 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/69771 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/61075 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/95387 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:27:36.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846" }, { "name": "69771", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69771" }, { "name": "61075", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61075" }, { "name": "ibm-storwize-cve20144811-superuser(95387)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-28T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846" }, { "name": "69771", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69771" }, { "name": "61075", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61075" }, { "name": "ibm-storwize-cve20144811-superuser(95387)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2014-4811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846" }, { "name": "69771", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69771" }, { "name": "61075", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61075" }, { "name": "ibm-storwize-cve20144811-superuser(95387)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2014-4811", "datePublished": "2014-09-12T01:00:00", "dateReserved": "2014-07-09T00:00:00", "dateUpdated": "2024-08-06T11:27:36.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6354
Vulnerability from cvelistv5
Published
2013-02-19 19:00
Modified
2024-08-06 21:28
Severity ?
EPSS score ?
Summary
The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets.
References
▼ | URL | Tags |
---|---|---|
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/80716 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277" }, { "name": "systemstorage-san-auth-bypass(80716)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277" }, { "name": "systemstorage-san-auth-bypass(80716)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2012-6354", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The management GUI on the IBM SAN Volume Controller and Storwize V7000 6.x before 6.4.1.3 allows remote attackers to bypass authentication and obtain superuser access via IP packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004277" }, { "name": "systemstorage-san-auth-bypass(80716)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80716" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2012-6354", "datePublished": "2013-02-19T19:00:00", "dateReserved": "2012-12-16T00:00:00", "dateUpdated": "2024-08-06T21:28:39.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0880
Vulnerability from cvelistv5
Published
2014-03-29 01:00
Modified
2024-08-06 09:27
Severity ?
EPSS score ?
Summary
IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/91145 | vdb-entry, x_refsource_XF | |
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:27:20.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ibm-storwize-cve20140880-cli(91145)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "ibm-storwize-cve20140880-cli(91145)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2014-0880", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ibm-storwize-cve20140880-cli(91145)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2014-0880", "datePublished": "2014-03-29T01:00:00", "dateReserved": "2014-01-06T00:00:00", "dateUpdated": "2024-08-06T09:27:20.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }