cve-2014-0880
Vulnerability from cvelistv5
Published
2014-03-29 01:00
Modified
2024-08-06 09:27
Severity ?
Summary
IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:27:20.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ibm-storwize-cve20140880-cli(91145)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "name": "ibm-storwize-cve20140880-cli(91145)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@us.ibm.com",
          "ID": "CVE-2014-0880",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ibm-storwize-cve20140880-cli(91145)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91145"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2014-0880",
    "datePublished": "2014-03-29T01:00:00",
    "dateReserved": "2014-01-06T00:00:00",
    "dateUpdated": "2024-08-06T09:27:20.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C3C36EF-C35E-41B6-AF6C-F32D4AAB2DD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33941722-CDAA-4008-BA8E-B0B9CA57F6E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B8504EB-5E20-4D31-936E-BF5657BBCE17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E4392F5-4235-49A4-ADBF-062D6B609717\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C4FCEBC-0037-4D0F-8A9E-2156FF7A0C74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E06C83C3-1BA8-4D5A-8E85-280C0D8E15D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAEE7E92-9350-4975-88C7-9D73650FF9FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"272C88A1-A4E8-4EF9-AA69-E8182D3D8085\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B07E61C5-7460-43B8-99F2-2B997F4D18B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3842D05A-E8DD-4059-A97B-DEC252AAF747\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A726F20-F7F8-4BB0-A957-B13B740593F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABE5B453-938D-4D0E-A73D-D1E031F252AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D71F79E2-FB50-4DEB-996F-A3C7C3DFA162\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBCBEB5F-F61C-4C60-A5CC-095B72E0A5AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20E152F0-945E-4E62-8222-0CC867BACF1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28E58505-A6C2-4EF7-8972-541B233E0EAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51F2B0D2-338C-44E7-9572-0E6760DC2941\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28E7387E-EC7A-4777-801A-D592F587187C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6691E037-5C4D-40FB-8780-ACC610DFB03D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF4A7953-A5F9-489B-A3EC-5F906DE9A0BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"603B887B-9B61-4500-9522-3E5FF7911E85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"581DC23E-1B96-4518-9927-46EE19D774F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B045357-3AC5-4665-AA0B-8EECE96170A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC2FF67C-8913-4CE4-B02B-4851F5392DD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9A41443-F351-4D16-9212-AC45F25472A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"312A73CE-27BF-483D-900A-EBFD1F61DD1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5F64E8C-1813-4783-B3E9-1DB480BFFB88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16730D31-B760-4CE0-A781-7E19BED85148\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B03BFA45-FFEE-4CE6-8A70-0A3998B0FB62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"536CB2D2-01FE-482E-95AD-185A9450A5D0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA2ED020-4C7B-4303-ABE6-74D46D127556\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EB9D8B3-112D-43C3-A3E9-2ED69F74CF51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB7A26D6-FAE2-44C4-A724-2888D102B562\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F6674D7-4958-44A9-A3AD-215FAB054137\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14D6CFC9-A13E-4B3D-93C3-55CC7D56B7C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"468940E2-EF8B-4E30-81D5-FD0756AA2465\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62697D10-9439-4F3C-BE18-E472E70A69B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8738466C-00B4-421A-B767-E5D2E4E9AAF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"924011A4-5C61-4F2C-8EFA-B1A57F6DC8B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D49F200B-E095-4DBC-AE10-EB4018DF4C31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5702E12D-0353-411B-987A-4D8B856F28D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D6672F7-53B7-4B31-9B47-2EE932CA17DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D3A88B4-B18B-454C-985A-CE7AD1807C3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3935F99-783C-4F6F-957F-0469DF305592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"624A3B53-B175-4EEE-9921-8460E098A695\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12CCB16A-EFA1-45A0-97BF-A2F368113D78\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DACA26CF-7C3F-4215-B032-ED9C5EFD57D8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A78DD9B-A3E5-4D0D-AF20-3B38DA53AFCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE8C1FE7-9130-4312-B5E0-866E8F18A42E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15C5FC9F-10B7-4C75-A7F1-C65E1111AB0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEC8645C-48E3-4DD2-B957-65C0327ED640\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71DC07FE-7CBB-4832-B134-208355645FA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01A2B74F-B526-4823-A01E-2B003CFD966E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23352AFF-45E3-4321-82A1-C0491FCCAB80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66339FDE-784B-4B57-9EAD-BEA87632B3F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"606F1E97-8D8F-49E4-9767-1E3AD7B0CFC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"147987EC-EE82-4FDB-B827-8519B1FE4973\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83F6BC04-C948-4C9B-9A5D-5AC16F658953\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE1333C0-AF7D-4F0D-9B97-956C9DCCB947\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"099199DC-6C70-4DB1-9C9F-9AD72D69CAC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A0A3903-03CF-48AC-A7A0-B017094AF2D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"952F19BC-003C-41BC-B6AC-9FD4C2CE51EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92792928-1B73-491C-A395-AD2CB9766B7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC166C78-C1D8-4C4B-89E1-40D464D99166\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"941A4E6C-4143-46DA-BFD3-7A3A9463DB0E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49318A1D-49F6-4CA7-AE31-0EB4B3790CBB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4351CCF0-79FE-4725-B080-0013E993636E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B34C10D-E04B-48FB-A25C-35E07C715F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B5B6300-CCF2-4DF3-A428-4434436AF76D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42EA6E91-FFB7-4A2D-9DE6-3DBC1B7B1C64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B41926D-AECB-4F82-9433-0BB26E0FEDCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEE8161F-2DC8-4219-8B1E-E51E5BDEAC5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB619465-4165-4831-8476-927FD124A6E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF2CAA80-8FD2-424A-865D-E46F6F6693ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5264E7F-73A3-4315-A4C2-8EBFFE4941F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE49FF35-4E86-4E63-B11E-D56DCC3BBB0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52D79838-65C4-4E8D-84F9-13E477FFB5DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D373E3B-0065-496D-9810-A7C0B848338F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9E871D3-92DF-491F-BD86-B4C752A24601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AE17C6B-127D-44F7-AA2F-C610ACA6A394\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC97C63B-9F2C-44FA-B0B0-CAB1710D27BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC051031-2AC5-4263-94BA-810F3AACF942\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18B411DE-9EF0-453A-9FA2-2513AF7151B4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7352FACE-C8D0-49A7-A2D7-B755599F0FB3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1EB415E-0E3F-4CB7-A565-BEDBA1F2767C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09583A2A-17B3-45BB-8407-807B520B1116\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"904E3322-AE92-4E5B-9113-38EB13AD4A6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55915790-FF4F-413F-86F3-17E555EC4111\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA23490B-9247-43AD-8DE0-1540331C9865\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D38B4F8A-ACC9-4E6D-9AD0-5D6FB63FAC72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B6FC5F1-7632-4769-9773-E884BCD473BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36B8A601-8794-4170-BE36-9C5488C08C4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D2F36C9-3FE9-4A9F-81B0-5C8F201B76A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7224320E-0576-45DA-A5B6-49C5E6905603\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A591634C-4D3C-4EFF-AE9B-F40B418801DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD597E3C-7F69-46A8-B26C-420360803ED0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62626CC1-07A1-4932-A1FF-769B62AE0F16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE906283-5CEA-496F-B402-A1BC107E6014\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0328A41B-30D1-4257-958B-BF6B26B63BC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05C0724F-1E90-4CB7-9874-6CDC64542965\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FAB607A-537A-4F9C-91BB-7E8FFAF3763A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"024793B5-0283-4C7E-8D5C-13963FA48E95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC6309B7-DCDD-409A-8CB2-31E8EA9CD2D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57A82C4A-74AD-4E7C-9DE4-D865B85AF681\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B74E59F-9B31-4FE8-93A8-C6AE55AC6F8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BCE28A3-4299-465F-9345-4DBE2F3C5AB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2531B05-9CBB-4544-A469-1205BDB81230\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14BDEB64-3841-4FA7-B20A-59BA87CD1AFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C0D3F5E-72BB-4DED-AD7F-AAB5D8D62775\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC2FEBA6-0C2D-4348-8E42-BBB149C671A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF4647B1-E9CD-4CD3-A8D8-F094F85FFA4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8587A38-B9B8-41A8-A1FE-85C48AE02118\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57FE10E8-378E-4EE4-ABBE-1CD3ADE1A81C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE9E2D8C-4DFF-4A49-A791-97052E3F7977\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D64878E-DA62-4832-9788-3447D1BDD085\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B88F8FF9-1786-4D9A-B6F8-5AA31943EDFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC8E4B98-E236-440A-BCD8-3BCE7DBAC9C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8C9303A-DBE7-4E35-9B31-5B68261C1D7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4729D5AE-8FE4-433B-8A6D-B5910CDA097F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B9469F3-1A77-452D-B2FB-1F4FF9851635\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AACA863-BDD0-435A-BD24-A0C6246D034D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0DC5BD8-C700-4A72-B31B-DF526B86713B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D24970E7-DFE9-4771-8F8D-6FAC469B406D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A94780AF-B79A-417A-A144-A67CEC63C5F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A74D2B14-045E-404A-9853-775D3E14416C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC47A4E4-6CD8-48BF-80B7-FFB6EE6CB9DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"208E3BF4-7721-4C71-AED6-7847A8DEBB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5EF61CC-F3D3-44D7-A584-2688AC9E8E34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"216B2D7C-819C-4788-99BD-FC9AEC1C4832\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"731522C8-9B1A-48CA-A3D6-399722BEFADF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5D84487-CEBA-48A0-9B15-A0300D992E3D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D13E364-FD0F-4E65-BEF4-B1E9BE96FA6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D43D5FD-B6B0-4358-94B8-AF2B6E89BEB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"590B8B88-E7BF-4FCC-9ECF-2F9AEFB14BD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0145D583-2530-43E7-9F53-7333AB82D979\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B20CFFCE-FCC7-43B6-AAE5-B94D74529FC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8D000DC-DFFD-450B-A950-CB843AD49F19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55CE73A4-131E-473A-BFA6-CB0E254E2753\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0596DADB-8DDD-4879-AAC7-FBA84ACFCEE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4D9C7D6-2FD4-4E5C-A902-9E6EC460C10F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.\"}, {\"lang\": \"es\", \"value\": \"IBM SAN Volume Controller; Storwize V3500, V3700, V5000 y V7000; y Flex System V7000 con software 6.3 y 6.4 anterior a 6.4.1.8 y 7.1 y 7.2 anterior a 7.2.0.3, permite a atacantes remotos obtener acceso CLI, y como consecuencia causar una denegaci\\u00f3n de servicio, a trav\\u00e9s de trafico no especificado hacia la direcci\\u00f3n IP administrativa.\"}]",
      "id": "CVE-2014-0880",
      "lastModified": "2024-11-21T02:02:58.060",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2014-03-29T01:55:07.047",
      "references": "[{\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/91145\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/91145\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "psirt@us.ibm.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-0880\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2014-03-29T01:55:07.047\",\"lastModified\":\"2024-11-21T02:02:58.060\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM SAN Volume Controller; Storwize V3500, V3700, V5000, and V7000; and Flex System V7000 with software 6.3 and 6.4 before 6.4.1.8, and 7.1 and 7.2 before 7.2.0.3, allow remote attackers to obtain CLI access, and consequently cause a denial of service, via unspecified traffic to the administrative IP address.\"},{\"lang\":\"es\",\"value\":\"IBM SAN Volume Controller; Storwize V3500, V3700, V5000 y V7000; y Flex System V7000 con software 6.3 y 6.4 anterior a 6.4.1.8 y 7.1 y 7.2 anterior a 7.2.0.3, permite a atacantes remotos obtener acceso CLI, y como consecuencia causar una denegaci\u00f3n de servicio, a trav\u00e9s de trafico no especificado hacia la direcci\u00f3n IP administrativa.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C3C36EF-C35E-41B6-AF6C-F32D4AAB2DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33941722-CDAA-4008-BA8E-B0B9CA57F6E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B8504EB-5E20-4D31-936E-BF5657BBCE17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E4392F5-4235-49A4-ADBF-062D6B609717\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C4FCEBC-0037-4D0F-8A9E-2156FF7A0C74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06C83C3-1BA8-4D5A-8E85-280C0D8E15D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAEE7E92-9350-4975-88C7-9D73650FF9FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"272C88A1-A4E8-4EF9-AA69-E8182D3D8085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B07E61C5-7460-43B8-99F2-2B997F4D18B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3842D05A-E8DD-4059-A97B-DEC252AAF747\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A726F20-F7F8-4BB0-A957-B13B740593F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE5B453-938D-4D0E-A73D-D1E031F252AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D71F79E2-FB50-4DEB-996F-A3C7C3DFA162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBCBEB5F-F61C-4C60-A5CC-095B72E0A5AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20E152F0-945E-4E62-8222-0CC867BACF1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E58505-A6C2-4EF7-8972-541B233E0EAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51F2B0D2-338C-44E7-9572-0E6760DC2941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E7387E-EC7A-4777-801A-D592F587187C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6691E037-5C4D-40FB-8780-ACC610DFB03D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:6.4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4A7953-A5F9-489B-A3EC-5F906DE9A0BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"603B887B-9B61-4500-9522-3E5FF7911E85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581DC23E-1B96-4518-9927-46EE19D774F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B045357-3AC5-4665-AA0B-8EECE96170A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC2FF67C-8913-4CE4-B02B-4851F5392DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A41443-F351-4D16-9212-AC45F25472A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"312A73CE-27BF-483D-900A-EBFD1F61DD1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:7.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F64E8C-1813-4783-B3E9-1DB480BFFB88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16730D31-B760-4CE0-A781-7E19BED85148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03BFA45-FFEE-4CE6-8A70-0A3998B0FB62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v7000_software:7.2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"536CB2D2-01FE-482E-95AD-185A9450A5D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA2ED020-4C7B-4303-ABE6-74D46D127556\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EB9D8B3-112D-43C3-A3E9-2ED69F74CF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB7A26D6-FAE2-44C4-A724-2888D102B562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6674D7-4958-44A9-A3AD-215FAB054137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D6CFC9-A13E-4B3D-93C3-55CC7D56B7C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"468940E2-EF8B-4E30-81D5-FD0756AA2465\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:6.4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62697D10-9439-4F3C-BE18-E472E70A69B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8738466C-00B4-421A-B767-E5D2E4E9AAF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"924011A4-5C61-4F2C-8EFA-B1A57F6DC8B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D49F200B-E095-4DBC-AE10-EB4018DF4C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5702E12D-0353-411B-987A-4D8B856F28D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6672F7-53B7-4B31-9B47-2EE932CA17DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:7.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3A88B4-B18B-454C-985A-CE7AD1807C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3935F99-783C-4F6F-957F-0469DF305592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"624A3B53-B175-4EEE-9921-8460E098A695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:flex_system_v7000_software:7.2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12CCB16A-EFA1-45A0-97BF-A2F368113D78\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACA26CF-7C3F-4215-B032-ED9C5EFD57D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A78DD9B-A3E5-4D0D-AF20-3B38DA53AFCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8C1FE7-9130-4312-B5E0-866E8F18A42E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15C5FC9F-10B7-4C75-A7F1-C65E1111AB0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEC8645C-48E3-4DD2-B957-65C0327ED640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71DC07FE-7CBB-4832-B134-208355645FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01A2B74F-B526-4823-A01E-2B003CFD966E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23352AFF-45E3-4321-82A1-C0491FCCAB80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:6.4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66339FDE-784B-4B57-9EAD-BEA87632B3F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"606F1E97-8D8F-49E4-9767-1E3AD7B0CFC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"147987EC-EE82-4FDB-B827-8519B1FE4973\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83F6BC04-C948-4C9B-9A5D-5AC16F658953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE1333C0-AF7D-4F0D-9B97-956C9DCCB947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"099199DC-6C70-4DB1-9C9F-9AD72D69CAC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A0A3903-03CF-48AC-A7A0-B017094AF2D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:7.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952F19BC-003C-41BC-B6AC-9FD4C2CE51EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92792928-1B73-491C-A395-AD2CB9766B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC166C78-C1D8-4C4B-89E1-40D464D99166\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3700_software:7.2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"941A4E6C-4143-46DA-BFD3-7A3A9463DB0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49318A1D-49F6-4CA7-AE31-0EB4B3790CBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4351CCF0-79FE-4725-B080-0013E993636E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B34C10D-E04B-48FB-A25C-35E07C715F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B5B6300-CCF2-4DF3-A428-4434436AF76D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42EA6E91-FFB7-4A2D-9DE6-3DBC1B7B1C64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B41926D-AECB-4F82-9433-0BB26E0FEDCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE8161F-2DC8-4219-8B1E-E51E5BDEAC5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB619465-4165-4831-8476-927FD124A6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:6.4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF2CAA80-8FD2-424A-865D-E46F6F6693ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5264E7F-73A3-4315-A4C2-8EBFFE4941F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE49FF35-4E86-4E63-B11E-D56DCC3BBB0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D79838-65C4-4E8D-84F9-13E477FFB5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D373E3B-0065-496D-9810-A7C0B848338F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E871D3-92DF-491F-BD86-B4C752A24601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:7.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AE17C6B-127D-44F7-AA2F-C610ACA6A394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC97C63B-9F2C-44FA-B0B0-CAB1710D27BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC051031-2AC5-4263-94BA-810F3AACF942\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v3500_software:7.2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B411DE-9EF0-453A-9FA2-2513AF7151B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7352FACE-C8D0-49A7-A2D7-B755599F0FB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2689BD-29E9-43DE-9B1A-BEC7DB7AA7BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1EB415E-0E3F-4CB7-A565-BEDBA1F2767C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09583A2A-17B3-45BB-8407-807B520B1116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904E3322-AE92-4E5B-9113-38EB13AD4A6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55915790-FF4F-413F-86F3-17E555EC4111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA23490B-9247-43AD-8DE0-1540331C9865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D38B4F8A-ACC9-4E6D-9AD0-5D6FB63FAC72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6FC5F1-7632-4769-9773-E884BCD473BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36B8A601-8794-4170-BE36-9C5488C08C4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D2F36C9-3FE9-4A9F-81B0-5C8F201B76A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7224320E-0576-45DA-A5B6-49C5E6905603\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591634C-4D3C-4EFF-AE9B-F40B418801DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD597E3C-7F69-46A8-B26C-420360803ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62626CC1-07A1-4932-A1FF-769B62AE0F16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE906283-5CEA-496F-B402-A1BC107E6014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0328A41B-30D1-4257-958B-BF6B26B63BC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C0724F-1E90-4CB7-9874-6CDC64542965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FAB607A-537A-4F9C-91BB-7E8FFAF3763A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"024793B5-0283-4C7E-8D5C-13963FA48E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC6309B7-DCDD-409A-8CB2-31E8EA9CD2D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57A82C4A-74AD-4E7C-9DE4-D865B85AF681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B74E59F-9B31-4FE8-93A8-C6AE55AC6F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BCE28A3-4299-465F-9345-4DBE2F3C5AB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2531B05-9CBB-4544-A469-1205BDB81230\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14BDEB64-3841-4FA7-B20A-59BA87CD1AFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C0D3F5E-72BB-4DED-AD7F-AAB5D8D62775\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F7289C8-2996-4AAF-A4CA-FAAC9E43A3CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC2FEBA6-0C2D-4348-8E42-BBB149C671A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4647B1-E9CD-4CD3-A8D8-F094F85FFA4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8587A38-B9B8-41A8-A1FE-85C48AE02118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57FE10E8-378E-4EE4-ABBE-1CD3ADE1A81C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE9E2D8C-4DFF-4A49-A791-97052E3F7977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D64878E-DA62-4832-9788-3447D1BDD085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B88F8FF9-1786-4D9A-B6F8-5AA31943EDFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC8E4B98-E236-440A-BCD8-3BCE7DBAC9C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8C9303A-DBE7-4E35-9B31-5B68261C1D7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4729D5AE-8FE4-433B-8A6D-B5910CDA097F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:6.4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B9469F3-1A77-452D-B2FB-1F4FF9851635\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AACA863-BDD0-435A-BD24-A0C6246D034D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0DC5BD8-C700-4A72-B31B-DF526B86713B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24970E7-DFE9-4771-8F8D-6FAC469B406D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A94780AF-B79A-417A-A144-A67CEC63C5F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74D2B14-045E-404A-9853-775D3E14416C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC47A4E4-6CD8-48BF-80B7-FFB6EE6CB9DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:7.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"208E3BF4-7721-4C71-AED6-7847A8DEBB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5EF61CC-F3D3-44D7-A584-2688AC9E8E34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"216B2D7C-819C-4788-99BD-FC9AEC1C4832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:san_volume_controller_software:7.2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"731522C8-9B1A-48CA-A3D6-399722BEFADF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D84487-CEBA-48A0-9B15-A0300D992E3D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D13E364-FD0F-4E65-BEF4-B1E9BE96FA6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D43D5FD-B6B0-4358-94B8-AF2B6E89BEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"590B8B88-E7BF-4FCC-9ECF-2F9AEFB14BD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0145D583-2530-43E7-9F53-7333AB82D979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B20CFFCE-FCC7-43B6-AAE5-B94D74529FC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v5000_software:7.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8D000DC-DFFD-450B-A950-CB843AD49F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55CE73A4-131E-473A-BFA6-CB0E254E2753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0596DADB-8DDD-4879-AAC7-FBA84ACFCEE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:storwize_v5000_software:7.2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4D9C7D6-2FD4-4E5C-A902-9E6EC460C10F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD\"}]}]}],\"references\":[{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/91145\",\"source\":\"psirt@us.ibm.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004570\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/91145\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.