Search criteria

6 vulnerabilities found for thinkserver_rd450 by lenovo

FKIE_CVE-2016-8106

Vulnerability from fkie_nvd - Published: 2017-01-09 21:59 - Updated: 2025-04-20 01:37
Summary
A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.
Impacted products
Vendor Product Version
intel ethernet_controller_x710_firmware *
intel ethernet_controller_x710-am2_sr1zp -
intel ethernet_controller_x710-am2_sr1zq -
intel ethernet_controller_x710-bm2_sllkb -
intel ethernet_controller_x710-bm2_sllkc -
intel ethernet_controller_xl710-am1_sr1zm -
intel ethernet_controller_xl710-am1_sr1zn -
intel ethernet_controller_xl710-am2_sr1zk -
intel ethernet_controller_xl710-am2_sr1zl -
intel ethernet_controller_xl710-bm1_sllk9 -
intel ethernet_controller_xl710-bm1_sllka -
intel ethernet_controller_xl710-bm2_sllk7 -
intel ethernet_controller_xl710-bm2_sllk8 -
intel ethernet_controller_xl710_firmware *
intel eth_converged_ntwk_adptr_x710-da2_ex710da2g1p5 -
intel eth_converged_ntwk_adptr_x710-da4_ex710da4fhg1p5 -
intel eth_converged_ntwk_adptr_x710-da4_ex710da4g1p5 -
intel eth_converged_ntwk_adptr_xl710-qda1_exl710qda1g1p5 -
intel eth_converged_ntwk_adptr_xl710-qda2_exl710qda2g1p5 -
intel ethernet_converged_network_adapter_x710-da2_x710da2 -
intel ethernet_converged_network_adapter_x710-da2_x710da2blk -
intel ethernet_converged_network_adapter_x710-da2_x710da2g2p5 -
intel ethernet_converged_network_adapter_x710-da4_x710da4fh -
intel ethernet_converged_network_adapter_x710-da4_x710da4fhblk -
intel ethernet_converged_network_adapter_x710-da4_x710da4fhg2p5 -
intel ethernet_converged_network_adapter_x710-da4_x710da4g2p5 -
intel ethernet_converged_network_adapter_xl710-qda1_xl710qda1 -
intel ethernet_converged_network_adapter_xl710-qda1_xl710qda1blk -
intel ethernet_converged_network_adapter_xl710-qda1_xl710qda1g2p5 -
intel ethernet_converged_network_adapter_xl710-qda2_xl710qda2 -
intel ethernet_converged_network_adapter_xl710-qda2_xl710qda2blk -
intel ethernet_converged_network_adapter_xl710-qda2_xl710qda2g2p5 -
intel ethernet_i\/o_module_xl710-qda1_axx1p40frtiom -
intel ethernet_i\/o_module_xl710-qda2_axx2p40frtiom -
hp ethernet_10gb_2-port_562flr-sfp\+ *
hp ethernet_10gb_2-port_562sfp\+ *
hp ethernet_10gb_4-port_563sfp\+ *
hp proliant_xl260a_g9_server *
lenovo converged_hx_series 5.05
lenovo converged_hx5500_appliance 5.05
lenovo converged_hx5510_appliance 5.05
lenovo converged_hx7500_appliance 5.05
lenovo converged_hx7510_appliance 5.05
lenovo nextscale_nx360_m5 5.05
lenovo system_x3250_m5 5.05
lenovo system_x3500_m5 5.05
lenovo system_x3550_m5 5.05
lenovo system_x3650_m5 5.05
lenovo system_x3750_m4 5.05
lenovo system_x3850_x6 5.05
lenovo system_x3950_x6 5.05
lenovo thinkagile_cx2200 5.05
lenovo thinkagile_cx4200 5.05
lenovo thinkagile_cx4600 5.05
lenovo thinkserver_rd350 5.05
lenovo thinkserver_rd450 5.05
lenovo thinkserver_rd550 5.05
lenovo thinkserver_rd650 5.05
lenovo thinkserver_sd350 5.05
lenovo thinkserver_td350 5.05

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ethernet_controller_x710_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32F15AD-C473-4CA9-83C0-5C5A742F79D0",
              "versionEndIncluding": "5.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_x710-am2_sr1zp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC2A83AF-9369-4402-8A75-A3C475CBB3F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_x710-am2_sr1zq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97B1C742-A502-4141-B5BF-E0CB369152C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_x710-bm2_sllkb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69B0751F-4A90-4904-ADE0-DEE514BF6250",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_x710-bm2_sllkc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D6F374-62A0-42FC-B8D4-9C81FE88B9F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-am1_sr1zm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82C95EFE-2415-4BC3-870C-8FB417DAB28A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-am1_sr1zn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77AF59A1-845E-4CCF-8981-97781E424BD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-am2_sr1zk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B8A610-92A4-4126-A28D-9D2C2A14EA71",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-am2_sr1zl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9922F300-F6B6-4577-B8BD-EEDC4B8BCE32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-bm1_sllk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B150A489-45CC-4E9E-8EAB-17428027B3BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-bm1_sllka:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D38675ED-3E60-4595-89A8-8CA1AB27BC46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-bm2_sllk7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15CBDA2-2C43-4217-B13A-22D3538F2661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-bm2_sllk8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AD4DFC6-B159-4A8B-8F9A-CE7BA50D9671",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ethernet_controller_xl710_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A146247-ECE2-48A3-A35F-01559274D237",
              "versionEndIncluding": "5.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da2_ex710da2g1p5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0411F19-A223-4B66-B931-E1BB18FBCB62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da4_ex710da4fhg1p5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9357AC7-6247-4228-BBAE-67020C74D38F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da4_ex710da4g1p5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "626CD805-9C8D-434F-AA31-EB83D009076E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:eth_converged_ntwk_adptr_xl710-qda1_exl710qda1g1p5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAFA5E8B-C6F2-4EAA-A50B-92D858F82ED3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:eth_converged_ntwk_adptr_xl710-qda2_exl710qda2g1p5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ABA5AB6-9A30-4852-87E3-F1594BE83750",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91BC4250-0C6D-4458-B9B5-AA4008C08EB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2blk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11DB4C8-566C-448C-A18D-C625FA9DE11E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2g2p5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3B8147B-767F-49EF-9046-45BCFA2B2661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6709DAF-EE92-4110-8692-4A53C596CBE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fhblk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A916CAF0-EDCF-40D5-968F-652E378FF97C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fhg2p5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD026C34-293A-4DCD-874E-63BFE7116BDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4g2p5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87965D8A-A5FD-4BD9-86F9-9E48E6108A06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C438018-EC3A-4226-8252-1A77E5A50250",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1blk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7254F006-9AD7-4837-ABB9-7A5A8327AD49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1g2p5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9919B1A6-B5B9-4B54-89B6-FA3C17B13F48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC2E93B-DF2D-4442-9CA5-52F2BE36F411",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2blk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F67FE6-38C0-446C-8AD5-C9F713E188C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2g2p5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E51776-294A-449E-8EA9-49BD2725FBB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_i\\/o_module_xl710-qda1_axx1p40frtiom:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2E6BE9F-2333-4D14-94A0-90565430DCC1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ethernet_i\\/o_module_xl710-qda2_axx2p40frtiom:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2B9FB5-9868-42C7-96C8-464820F17D60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:ethernet_10gb_2-port_562flr-sfp\\+:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA295D13-518D-4E43-B112-77D2A48F01AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:ethernet_10gb_2-port_562sfp\\+:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "280334EE-CDCF-4EBC-97D6-7FA1507BDF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:ethernet_10gb_4-port_563sfp\\+:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F9FCDB-CBD5-448C-B459-A90379A067E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:proliant_xl260a_g9_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0C39A32-1068-4C64-9609-E9E789221B2B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lenovo:converged_hx_series:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "B462A39A-B3CF-4D3D-B138-87EDCFCC2A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:converged_hx5500_appliance:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FE78714-3153-47EC-BA64-AB8EB2CE894C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:converged_hx5510_appliance:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "638A62EA-C574-4359-84B1-046F49B5387E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:converged_hx7500_appliance:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1670FD8-05F2-4F29-AA5F-ED97291BAFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:converged_hx7510_appliance:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3B66CB9-3FD9-47D5-9817-62371C1ECC22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:nextscale_nx360_m5:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D4ECA79-BC4B-4888-A4DE-52492833B530",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:system_x3250_m5:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "758D0933-1265-4593-8647-E20E0CC24A93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:system_x3500_m5:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "686DB4DF-32A4-4FD4-A93E-E0E2171D4B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:system_x3550_m5:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F5D1172-A454-4550-9475-13834BE92A19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:system_x3650_m5:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "C040CE58-3A77-4689-BD61-8D82B6AE8128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:system_x3750_m4:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4098AC2-11F5-49C1-A4CB-570B1F3EBC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:system_x3850_x6:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A619F9E-AE80-4DC9-8DAD-B2123D005060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:system_x3950_x6:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F29E2DF-A1AD-4BA3-917A-1E86C9BAD49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:thinkagile_cx2200:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "1825E3B4-D5B6-48E9-8395-047EB41E3A34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:thinkagile_cx4200:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D8937BA-4BD8-40C7-B23D-A404252562A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:thinkagile_cx4600:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBAC6BBC-B21E-437B-81D8-63021C69E55A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:thinkserver_rd350:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "23DDFE96-ED30-4818-AA30-CC009ACC4CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:thinkserver_rd450:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "40318330-EB26-4242-8378-A69F01C479F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:thinkserver_rd550:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD58C401-31C3-48C9-B1AC-94706A98D286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:thinkserver_rd650:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C273581-6BAD-46F2-B865-0520B8F3ED65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:thinkserver_sd350:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF56B9E8-D24C-420F-8661-ADB3052F92CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lenovo:thinkserver_td350:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9B0ED3-3686-442F-A1D2-96F61FFA117B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Denial of Service in Intel Ethernet Controller\u0027s X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions."
    },
    {
      "lang": "es",
      "value": "Una denegaci\u00f3n de servicio en Intel Ethernet Controller\u0027s X710/XL710 con Non-Volatile Memory Images en versiones anteriores a 5.05 permite a atacantes remotos detener el controlador de procesar el tr\u00e1fico de red que funciona bajo determinadas condiciones de uso de la red."
    }
  ],
  "id": "CVE-2016-8106",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-01-09T21:59:00.160",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95333"
    },
    {
      "source": "secure@intel.com",
      "url": "http://www.securitytracker.com/id/1037562"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
    },
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1037562"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2015-3322

Vulnerability from fkie_nvd - Published: 2015-04-16 23:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Lenovo ThinkServer RD350, RD450, RD550, RD650, and TD350 servers before 1.26.0 use weak encryption to store (1) user and (2) administrator BIOS passwords, which allows attackers to decrypt the passwords via unspecified vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:lenovo:thinkserver_rd650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9CA62C6-C274-4A02-BA07-14F3093C441F",
              "versionEndIncluding": "1.25.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:lenovo:thinkserver_rd650:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B688F4B0-E786-48BE-8BF0-5D7264B2EEF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:lenovo:thinkserver_td350_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE5005E6-8AC3-4E3A-95B0-5874F3BC7970",
              "versionEndIncluding": "1.25.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:lenovo:thinkserver_td350:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E0DD7E-CC62-4384-91D4-7B2128780F7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:lenovo:thinkserver_rd350_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "614188E7-FB1D-41A5-B563-A484B1872DA3",
              "versionEndIncluding": "1.25.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:lenovo:thinkserver_rd350:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FAF28D1-5E43-4528-A92B-960AD7366A58",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:lenovo:thinkserver_rd550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D10220-9E77-4E53-8861-D6012DC0F084",
              "versionEndIncluding": "1.25.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:lenovo:thinkserver_rd550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F39E5A-4EB8-4581-8B40-F825E01B6D4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:lenovo:thinkserver_rd450_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46B2325F-2B5E-4ABF-9B60-A51A0433C0B2",
              "versionEndIncluding": "1.25.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:lenovo:thinkserver_rd450:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95F55A1-5D77-4D50-8D7F-EEC134451013",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Lenovo ThinkServer RD350, RD450, RD550, RD650, and TD350 servers before 1.26.0 use weak encryption to store (1) user and (2) administrator BIOS passwords, which allows attackers to decrypt the passwords via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Servidores Lenovo ThinkServer RD350, RD450, RD550, RD650 y TD350 en versiones anteriores a 1.26.0 utiliza cifrado d\u00e9bil para almacenar contrase\u00f1as BIOS de (1) usuario y (2) administrador, lo que permite a atacantes descifrar las contrase\u00f1as a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2015-3322",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-04-16T23:59:03.557",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/74198"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.lenovo.com/us/en/product_security/ts_bios_pw"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/74198"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.lenovo.com/us/en/product_security/ts_bios_pw"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2016-8106 (GCVE-0-2016-8106)

Vulnerability from cvelistv5 – Published: 2017-01-09 21:00 – Updated: 2024-08-06 02:13
VLAI?
Summary
A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:13:21.874Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "95333",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95333"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
          },
          {
            "name": "1037562",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037562"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel\u00c2\u00ae Ethernet Controller X710 family and Intel\u00c2\u00ae Ethernet Controller XL710 family",
          "vendor": "Intel",
          "versions": [
            {
              "status": "affected",
              "version": "Before NVM Version 5.05"
            }
          ]
        }
      ],
      "datePublic": "2017-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A Denial of Service in Intel Ethernet Controller\u0027s X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-01T00:06:08",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "95333",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95333"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
        },
        {
          "name": "1037562",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037562"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2016-8106",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel\u00c2\u00ae Ethernet Controller X710 family and Intel\u00c2\u00ae Ethernet Controller XL710 family",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before NVM Version 5.05"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intel"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A Denial of Service in Intel Ethernet Controller\u0027s X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "95333",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95333"
            },
            {
              "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr",
              "refsource": "CONFIRM",
              "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
            },
            {
              "name": "https://support.lenovo.com/us/en/product_security/LEN-12029",
              "refsource": "CONFIRM",
              "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
            },
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
            },
            {
              "name": "1037562",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037562"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20190731-0001/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2016-8106",
    "datePublished": "2017-01-09T21:00:00",
    "dateReserved": "2016-09-09T00:00:00",
    "dateUpdated": "2024-08-06T02:13:21.874Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-3322 (GCVE-0-2015-3322)

Vulnerability from cvelistv5 – Published: 2015-04-16 23:00 – Updated: 2024-08-06 05:47
VLAI?
Summary
Lenovo ThinkServer RD350, RD450, RD550, RD650, and TD350 servers before 1.26.0 use weak encryption to store (1) user and (2) administrator BIOS passwords, which allows attackers to decrypt the passwords via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:47:56.259Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/ts_bios_pw"
          },
          {
            "name": "74198",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/74198"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Lenovo ThinkServer RD350, RD450, RD550, RD650, and TD350 servers before 1.26.0 use weak encryption to store (1) user and (2) administrator BIOS passwords, which allows attackers to decrypt the passwords via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-01-12T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/ts_bios_pw"
        },
        {
          "name": "74198",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/74198"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-3322",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Lenovo ThinkServer RD350, RD450, RD550, RD650, and TD350 servers before 1.26.0 use weak encryption to store (1) user and (2) administrator BIOS passwords, which allows attackers to decrypt the passwords via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.lenovo.com/us/en/product_security/ts_bios_pw",
              "refsource": "CONFIRM",
              "url": "https://support.lenovo.com/us/en/product_security/ts_bios_pw"
            },
            {
              "name": "74198",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/74198"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-3322",
    "datePublished": "2015-04-16T23:00:00",
    "dateReserved": "2015-04-16T00:00:00",
    "dateUpdated": "2024-08-06T05:47:56.259Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-8106 (GCVE-0-2016-8106)

Vulnerability from nvd – Published: 2017-01-09 21:00 – Updated: 2024-08-06 02:13
VLAI?
Summary
A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:13:21.874Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "95333",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95333"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
          },
          {
            "name": "1037562",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037562"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel\u00c2\u00ae Ethernet Controller X710 family and Intel\u00c2\u00ae Ethernet Controller XL710 family",
          "vendor": "Intel",
          "versions": [
            {
              "status": "affected",
              "version": "Before NVM Version 5.05"
            }
          ]
        }
      ],
      "datePublic": "2017-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A Denial of Service in Intel Ethernet Controller\u0027s X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-01T00:06:08",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "95333",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95333"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
        },
        {
          "name": "1037562",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037562"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2016-8106",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel\u00c2\u00ae Ethernet Controller X710 family and Intel\u00c2\u00ae Ethernet Controller XL710 family",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before NVM Version 5.05"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intel"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A Denial of Service in Intel Ethernet Controller\u0027s X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "95333",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95333"
            },
            {
              "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr",
              "refsource": "CONFIRM",
              "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
            },
            {
              "name": "https://support.lenovo.com/us/en/product_security/LEN-12029",
              "refsource": "CONFIRM",
              "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
            },
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
            },
            {
              "name": "1037562",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037562"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20190731-0001/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2016-8106",
    "datePublished": "2017-01-09T21:00:00",
    "dateReserved": "2016-09-09T00:00:00",
    "dateUpdated": "2024-08-06T02:13:21.874Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-3322 (GCVE-0-2015-3322)

Vulnerability from nvd – Published: 2015-04-16 23:00 – Updated: 2024-08-06 05:47
VLAI?
Summary
Lenovo ThinkServer RD350, RD450, RD550, RD650, and TD350 servers before 1.26.0 use weak encryption to store (1) user and (2) administrator BIOS passwords, which allows attackers to decrypt the passwords via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:47:56.259Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/ts_bios_pw"
          },
          {
            "name": "74198",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/74198"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Lenovo ThinkServer RD350, RD450, RD550, RD650, and TD350 servers before 1.26.0 use weak encryption to store (1) user and (2) administrator BIOS passwords, which allows attackers to decrypt the passwords via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-01-12T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/ts_bios_pw"
        },
        {
          "name": "74198",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/74198"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-3322",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Lenovo ThinkServer RD350, RD450, RD550, RD650, and TD350 servers before 1.26.0 use weak encryption to store (1) user and (2) administrator BIOS passwords, which allows attackers to decrypt the passwords via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.lenovo.com/us/en/product_security/ts_bios_pw",
              "refsource": "CONFIRM",
              "url": "https://support.lenovo.com/us/en/product_security/ts_bios_pw"
            },
            {
              "name": "74198",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/74198"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-3322",
    "datePublished": "2015-04-16T23:00:00",
    "dateReserved": "2015-04-16T00:00:00",
    "dateUpdated": "2024-08-06T05:47:56.259Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}