CVE-2023-30438 (GCVE-0-2023-30438)

Vulnerability from cvelistv5 – Published: 2023-05-17 12:48 – Updated: 2025-01-22 16:48
VLAI?
Title
IBM PowerVM gain access
Summary
An internally discovered vulnerability in PowerVM on IBM Power9 and Power10 systems could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions which could lead to data leakage or the execution of arbitrary code in other logical partitions on the same physical server. IBM X-Force ID: 252706.
CWE
  • 264 Permissions, Privileges, Access Controls
Assigner
ibm
Impacted products
Vendor Product Version
IBM PowerVM Hypervisor Affected: FW950.00 , ≤ FW950.70 (semver)
Affected: FW1010.00 , ≤ FW1010.50 (semver)
Affected: FW1020.00 , ≤ FW1020.30 (semver)
Affected: FW1030.00 , ≤ FW1030.10 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:21:44.988Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.ibm.com/support/pages/node/6993021"
          },
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/252706"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-30438",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-22T16:47:57.952272Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-22T16:48:02.322Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PowerVM Hypervisor",
          "vendor": "IBM",
          "versions": [
            {
              "lessThanOrEqual": "FW950.70",
              "status": "affected",
              "version": "FW950.00",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "FW1010.50",
              "status": "affected",
              "version": "FW1010.00",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "FW1020.30",
              "status": "affected",
              "version": "FW1020.00",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "FW1030.10",
              "status": "affected",
              "version": "FW1030.00",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An internally discovered vulnerability in PowerVM on IBM Power9 and Power10 systems could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions which could lead to data leakage or the execution of arbitrary code in other logical partitions on the same physical server.  IBM X-Force ID:  252706."
            }
          ],
          "value": "An internally discovered vulnerability in PowerVM on IBM Power9 and Power10 systems could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions which could lead to data leakage or the execution of arbitrary code in other logical partitions on the same physical server.  IBM X-Force ID:  252706."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "264 Permissions, Privileges, Access Controls",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-17T12:48:37.240Z",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.ibm.com/support/pages/node/6993021"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/252706"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "IBM PowerVM gain access",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2023-30438",
    "datePublished": "2023-05-17T12:48:37.240Z",
    "dateReserved": "2023-04-08T15:56:20.544Z",
    "dateUpdated": "2025-01-22T16:48:02.322Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"fw950\", \"versionEndExcluding\": \"fw950.71\", \"matchCriteriaId\": \"7A87B171-ADB7-4B46-98DD-20A73CAFB967\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_e950:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"979E8340-B175-4248-820B-4FC7306D12C3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_e980:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9B5E3B4-BA6B-47C4-8591-709DF67017CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_h922:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FCDAAD9-A28E-4898-8A60-4B95EAD37E80\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_h924:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8139F881-7EB2-4C6F-B8F1-CB210A7DB3A6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_l922:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84563A0F-ECE3-4A6B-8167-7ABF52B78D3B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_s914:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DE5D80E-5A45-43EF-98F0-311D6DFBAC32\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_s922:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA5B852F-8016-4996-BC56-6B52E3880298\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_s924:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5CC42E6-BF00-4D10-B087-F92F8001C192\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"fw1010.00\", \"versionEndExcluding\": \"fw1010.51\", \"matchCriteriaId\": \"274B5B39-45C7-46AB-97DF-974EF88FD584\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"fw1030.00\", \"versionEndExcluding\": \"fw1030.11\", \"matchCriteriaId\": \"191E23FB-FB7F-4869-9B98-B1F8D0B678B9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_e1080:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FBC7B07-A1AC-4C5A-B35F-337DECC4BC48\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"fw1020.00\", \"versionEndExcluding\": \"fw1020.31\", \"matchCriteriaId\": \"4E56875D-2B34-4ADD-B881-42AD238E7C4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"fw1030.00\", \"versionEndExcluding\": \"fw1030.11\", \"matchCriteriaId\": \"191E23FB-FB7F-4869-9B98-B1F8D0B678B9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_e1050:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"519789D1-EB8C-4072-A427-AF4B86160743\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_l1022:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22EEBF55-9F36-40D7-B12D-B5623A2A5522\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_l1024:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2213E4C9-2078-43E0-B3EF-0F8D4DF49777\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_s1014:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ADC40A2-FBDC-4AE9-9B5F-085F0AF09653\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_s1022:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FE513F0-A79D-498D-BDFA-F593D81DAE0B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_s1022s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1305DC74-3CD8-4F03-A6E1-75C50B24ACDF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ibm:power_system_s1024:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40EC041F-71BA-49FB-8174-36002C650AAC\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"An internally discovered vulnerability in PowerVM on IBM Power9 and Power10 systems could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions which could lead to data leakage or the execution of arbitrary code in other logical partitions on the same physical server.  IBM X-Force ID:  252706.\"}]",
      "id": "CVE-2023-30438",
      "lastModified": "2024-11-21T08:00:11.077",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@us.ibm.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 9.3, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.5, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.0, \"impactScore\": 6.0}]}",
      "published": "2023-05-17T13:15:09.380",
      "references": "[{\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/252706\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"VDB Entry\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ibm.com/support/pages/node/6993021\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/252706\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"VDB Entry\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ibm.com/support/pages/node/6993021\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@us.ibm.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-30438\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2023-05-17T13:15:09.380\",\"lastModified\":\"2024-11-21T08:00:11.077\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An internally discovered vulnerability in PowerVM on IBM Power9 and Power10 systems could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions which could lead to data leakage or the execution of arbitrary code in other logical partitions on the same physical server.  IBM X-Force ID:  252706.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.3,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"fw950\",\"versionEndExcluding\":\"fw950.71\",\"matchCriteriaId\":\"7A87B171-ADB7-4B46-98DD-20A73CAFB967\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_e950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979E8340-B175-4248-820B-4FC7306D12C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_e980:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9B5E3B4-BA6B-47C4-8591-709DF67017CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_h922:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FCDAAD9-A28E-4898-8A60-4B95EAD37E80\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_h924:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8139F881-7EB2-4C6F-B8F1-CB210A7DB3A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_l922:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84563A0F-ECE3-4A6B-8167-7ABF52B78D3B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_s914:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DE5D80E-5A45-43EF-98F0-311D6DFBAC32\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_s922:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA5B852F-8016-4996-BC56-6B52E3880298\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_s924:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5CC42E6-BF00-4D10-B087-F92F8001C192\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"fw1010.00\",\"versionEndExcluding\":\"fw1010.51\",\"matchCriteriaId\":\"274B5B39-45C7-46AB-97DF-974EF88FD584\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"fw1030.00\",\"versionEndExcluding\":\"fw1030.11\",\"matchCriteriaId\":\"191E23FB-FB7F-4869-9B98-B1F8D0B678B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_e1080:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FBC7B07-A1AC-4C5A-B35F-337DECC4BC48\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"fw1020.00\",\"versionEndExcluding\":\"fw1020.31\",\"matchCriteriaId\":\"4E56875D-2B34-4ADD-B881-42AD238E7C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"fw1030.00\",\"versionEndExcluding\":\"fw1030.11\",\"matchCriteriaId\":\"191E23FB-FB7F-4869-9B98-B1F8D0B678B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_e1050:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"519789D1-EB8C-4072-A427-AF4B86160743\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_l1022:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22EEBF55-9F36-40D7-B12D-B5623A2A5522\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_l1024:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2213E4C9-2078-43E0-B3EF-0F8D4DF49777\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_s1014:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ADC40A2-FBDC-4AE9-9B5F-085F0AF09653\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_s1022:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FE513F0-A79D-498D-BDFA-F593D81DAE0B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_s1022s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1305DC74-3CD8-4F03-A6E1-75C50B24ACDF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:power_system_s1024:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40EC041F-71BA-49FB-8174-36002C650AAC\"}]}]}],\"references\":[{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/252706\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://www.ibm.com/support/pages/node/6993021\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/252706\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://www.ibm.com/support/pages/node/6993021\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/6993021\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/252706\", \"tags\": [\"vdb-entry\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T14:21:44.988Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-30438\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-22T16:47:57.952272Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-22T16:47:43.507Z\"}}], \"cna\": {\"title\": \"IBM PowerVM gain access\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"IBM\", \"product\": \"PowerVM Hypervisor\", \"versions\": [{\"status\": \"affected\", \"version\": \"FW950.00\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"FW950.70\"}, {\"status\": \"affected\", \"version\": \"FW1010.00\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"FW1010.50\"}, {\"status\": \"affected\", \"version\": \"FW1020.00\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"FW1020.30\"}, {\"status\": \"affected\", \"version\": \"FW1030.00\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"FW1030.10\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/6993021\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/252706\", \"tags\": [\"vdb-entry\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An internally discovered vulnerability in PowerVM on IBM Power9 and Power10 systems could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions which could lead to data leakage or the execution of arbitrary code in other logical partitions on the same physical server.  IBM X-Force ID:  252706.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An internally discovered vulnerability in PowerVM on IBM Power9 and Power10 systems could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions which could lead to data leakage or the execution of arbitrary code in other logical partitions on the same physical server.  IBM X-Force ID:  252706.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"264 Permissions, Privileges, Access Controls\"}]}], \"providerMetadata\": {\"orgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"shortName\": \"ibm\", \"dateUpdated\": \"2023-05-17T12:48:37.240Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-30438\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-22T16:48:02.322Z\", \"dateReserved\": \"2023-04-08T15:56:20.544Z\", \"assignerOrgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"datePublished\": \"2023-05-17T12:48:37.240Z\", \"assignerShortName\": \"ibm\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…