CNVD-2024-46401

Vulnerability from cnvd - Published: 2024-11-27
VLAI Severity ?
Title
IBM Flexible Service Processor信任管理问题漏洞
Description
IBM Flexible Service Processor(IBM FSP)是美国国际商业机器(IBM)公司的一系列灵活服务处理器。 IBM Flexible Service Processor存在信任管理问题漏洞,该漏洞源于具有静态凭证,可能允许网络用户获得FSP 的服务特权。目前没有详细的漏洞细节提供。
Severity
Patch Name
IBM Flexible Service Processor信任管理问题漏洞的补丁
Patch Description
IBM Flexible Service Processor(IBM FSP)是美国国际商业机器(IBM)公司的一系列灵活服务处理器。 IBM Flexible Service Processor存在信任管理问题漏洞,该漏洞源于具有静态凭证,可能允许网络用户获得FSP 的服务特权。目前没有详细的漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://www.ibm.com/support/pages/node/7174183

Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45656
Impacted products
Name
IBM Flexible Service Processor
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2024-45656",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-45656"
    }
  },
  "description": "IBM Flexible Service Processor\uff08IBM FSP\uff09\u662f\u7f8e\u56fd\u56fd\u9645\u5546\u4e1a\u673a\u5668\uff08IBM\uff09\u516c\u53f8\u7684\u4e00\u7cfb\u5217\u7075\u6d3b\u670d\u52a1\u5904\u7406\u5668\u3002\n\nIBM Flexible Service Processor\u5b58\u5728\u4fe1\u4efb\u7ba1\u7406\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5177\u6709\u9759\u6001\u51ed\u8bc1\uff0c\u53ef\u80fd\u5141\u8bb8\u7f51\u7edc\u7528\u6237\u83b7\u5f97FSP \u7684\u670d\u52a1\u7279\u6743\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://www.ibm.com/support/pages/node/7174183",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2024-46401",
  "openTime": "2024-11-27",
  "patchDescription": "IBM Flexible Service Processor\uff08IBM FSP\uff09\u662f\u7f8e\u56fd\u56fd\u9645\u5546\u4e1a\u673a\u5668\uff08IBM\uff09\u516c\u53f8\u7684\u4e00\u7cfb\u5217\u7075\u6d3b\u670d\u52a1\u5904\u7406\u5668\u3002\r\n\r\nIBM Flexible Service Processor\u5b58\u5728\u4fe1\u4efb\u7ba1\u7406\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5177\u6709\u9759\u6001\u51ed\u8bc1\uff0c\u53ef\u80fd\u5141\u8bb8\u7f51\u7edc\u7528\u6237\u83b7\u5f97FSP \u7684\u670d\u52a1\u7279\u6743\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "IBM Flexible Service Processor\u4fe1\u4efb\u7ba1\u7406\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "IBM Flexible Service Processor"
  },
  "referenceLink": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45656",
  "serverity": "\u9ad8",
  "submitTime": "2024-11-22",
  "title": "IBM Flexible Service Processor\u4fe1\u4efb\u7ba1\u7406\u95ee\u9898\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…