All the vulnerabilites related to ibm - system_x3650_m3_firmware
Vulnerability from fkie_nvd
Published
2021-11-12 22:15
Modified
2024-11-21 06:22
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://support.lenovo.com/us/en/product_security/LEN-66347 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.lenovo.com/us/en/product_security/LEN-66347 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | system_x3550_m3_firmware | * | |
ibm | system_x3550_m3 | - | |
ibm | system_x3650_m3_firmware | * | |
ibm | system_x3650_m3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:system_x3550_m3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B61B40-2682-435E-BFB2-BC79DC316DB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:system_x3550_m3:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E33754-643B-41FD-A751-4E1A029EFBD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:system_x3650_m3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82F221F6-D2D9-4E7A-AD8E-925ACC0AD82D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:system_x3650_m3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CE88C85-1397-447D-9352-9609571E62B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session." }, { "lang": "es", "value": "Se ha informado de una vulnerabilidad de inyecci\u00f3n de comandos en el m\u00f3dulo de administraci\u00f3n integrada (IMM) de los servidores IBM System x 3550 M3 e IBM System x 3650 M3 heredados que podr\u00eda permitir una ejecuci\u00f3n de comandos del sistema operativo a trav\u00e9s de una sesi\u00f3n SSH o Telnet autenticada" } ], "id": "CVE-2021-3723", "lastModified": "2024-11-21T06:22:15.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "psirt@lenovo.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-12T22:15:08.057", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-66347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-66347" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "psirt@lenovo.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2021-3723
Vulnerability from cvelistv5
Published
2021-11-12 22:05
Modified
2024-08-03 17:01
Severity ?
EPSS score ?
Summary
A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session.
References
▼ | URL | Tags |
---|---|---|
https://support.lenovo.com/us/en/product_security/LEN-66347 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | IBM | IBM System x 3550 M3 |
Version: all |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:01:07.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-66347" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IBM System x 3550 M3", "vendor": "IBM", "versions": [ { "status": "affected", "version": "all" } ] }, { "product": "IBM System x 3650 M3", "vendor": "IBM", "versions": [ { "status": "affected", "version": "all" } ] } ], "credits": [ { "lang": "en", "value": "Lenovo thanks Denver Abrey (@Denver_A) for reporting this issue." } ], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T22:05:39", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-66347" } ], "source": { "advisory": "LEN-66347", "discovery": "UNKNOWN" }, "workarounds": [ { "lang": "en", "value": "Lenovo has ended support for legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers as of December 31, 2019, therefore Lenovo recommends discontinuation of use. If it is not feasible to discontinue use of these systems, Lenovo recommends customers:\nDisable SSH and Telnet (This can be done in the Security and Network Protocol sections of the navigation pane after logging into the IMM web interface)\nChange the default Administrator password during initial configuration\nEnforce strong passwords\nOnly grant access to trusted administrators" } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2021-3723", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IBM System x 3550 M3", "version": { "version_data": [ { "version_affected": "=", "version_value": "all" } ] } }, { "product_name": "IBM System x 3650 M3", "version": { "version_data": [ { "version_affected": "=", "version_value": "all" } ] } } ] }, "vendor_name": "IBM" } ] } }, "credit": [ { "lang": "eng", "value": "Lenovo thanks Denver Abrey (@Denver_A) for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.lenovo.com/us/en/product_security/LEN-66347", "refsource": "MISC", "url": "https://support.lenovo.com/us/en/product_security/LEN-66347" } ] }, "source": { "advisory": "LEN-66347", "discovery": "UNKNOWN" }, "work_around": [ { "lang": "en", "value": "Lenovo has ended support for legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers as of December 31, 2019, therefore Lenovo recommends discontinuation of use. If it is not feasible to discontinue use of these systems, Lenovo recommends customers:\nDisable SSH and Telnet (This can be done in the Security and Network Protocol sections of the navigation pane after logging into the IMM web interface)\nChange the default Administrator password during initial configuration\nEnforce strong passwords\nOnly grant access to trusted administrators" } ] } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2021-3723", "datePublished": "2021-11-12T22:05:39", "dateReserved": "2021-08-18T00:00:00", "dateUpdated": "2024-08-03T17:01:07.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }