cve-2020-7202
Vulnerability from cvelistv5
Published
2021-01-05 14:08
Modified
2024-08-04 09:25
Severity ?
EPSS score ?
Summary
A potential security vulnerability has been identified in HPE Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4) firmware. The vulnerability could be remotely exploited to disclose the serial number and other information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | HPE ProLiant Servers, Apollo Products, Converged Systems, and Synergy Compute Modules with Integrated Lights-Out 5 (iLO 5), or Integrated Lights-Out 4 (iLO 4) |
Version: Prior to iLO 5 v2.31 Version: Prior to iLO 4 v2.76 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:25:48.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04069en_us" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HPE ProLiant Servers, Apollo Products, Converged Systems, and Synergy Compute Modules with Integrated Lights-Out 5 (iLO 5), or Integrated Lights-Out 4 (iLO 4)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Prior to iLO 5 v2.31" }, { "status": "affected", "version": "Prior to iLO 4 v2.76" } ] } ], "descriptions": [ { "lang": "en", "value": "A potential security vulnerability has been identified in HPE Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4) firmware. The vulnerability could be remotely exploited to disclose the serial number and other information." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote disclosure of information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-05T14:08:28", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04069en_us" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2020-7202", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HPE ProLiant Servers, Apollo Products, Converged Systems, and Synergy Compute Modules with Integrated Lights-Out 5 (iLO 5), or Integrated Lights-Out 4 (iLO 4)", "version": { "version_data": [ { "version_value": "Prior to iLO 5 v2.31" }, { "version_value": "Prior to iLO 4 v2.76" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential security vulnerability has been identified in HPE Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4) firmware. The vulnerability could be remotely exploited to disclose the serial number and other information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote disclosure of information" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04069en_us", "refsource": "MISC", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04069en_us" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2020-7202", "datePublished": "2021-01-05T14:08:28", "dateReserved": "2020-01-16T00:00:00", "dateUpdated": "2024-08-04T09:25:48.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:integrated_lights-out_4:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.76\", \"matchCriteriaId\": \"728B6275-69A0-4235-B877-A80EAA5AE662\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:apollo_4200_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C145C31-ED51-48CA-AC14-53A46F3DA0B9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:convergedsystem_cs700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07452929-D568-4D48-9480-6F03AD39EBC8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:convergedsystem_cs700x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72DE103E-83D9-4A9C-BB91-F876448443CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_bl420c_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE085EBF-9338-4F4D-BA6D-DF71EB55809D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_bl460c_gen8_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7C5EE27-AC35-490B-AF26-FDA261AA03B5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BB98203-AFC1-489F-BA7D-F66E3275774A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_bl465c_gen8_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E16A3168-F12A-47D9-B80B-11815DDAA24E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_bl660c_gen8_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5E3FC67-8EBC-4EE9-B518-561602DD617F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66EB270B-9289-4D3D-91A8-751CF2C62BD5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2483ED79-0132-4484-808B-8DA9F2F9CE1E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl160_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35D7105B-54F9-480D-95B6-9BFACD405450\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFADFAB1-F9C7-4613-AB00-6088A54B2984\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFBF3AAB-5A41-498D-8934-5069086AF0A4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl320e_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A10ED119-2AFB-4A19-8EC9-11DD00C771C3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl320e_gen8_v2_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CB4D64F-C78D-4A5A-8213-85607DD5DC3D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5562E797-E2BA-49A7-A7FD-F345F3B3EDC1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl360e_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE32C218-B3DC-4915-A170-D41EA356B37F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl360p_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"971D98CB-488B-475E-834F-D7F2C2D15618\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4176A85-6BA7-4A49-95A6-759655FCE437\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl380e_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2B60FD7-710F-4596-AC1E-C92BE1F73185\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl380p_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"089A9561-E2E3-4E6C-8E2A-3E0559306B9C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl385p_gen8_\\\\(amd\\\\):-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DF8D7D0-50A7-45CE-8C57-2BF809D6D467\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl560_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B0B6A0E-982B-49F8-9CD8-675599E801DA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C250444-6DCB-492C-9C09-BCB4D8F9522E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl580_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD283162-B57B-4041-A36D-70C15C5CAD2B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E11FBED-28C9-4D77-BCE4-847115EC5A56\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03D1BA51-A089-4CB6-8B7A-44B29BE38D65\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"501CE644-836D-45D7-A525-00443E496279\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_microserver_gen8:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2D4A053-A170-41E8-85A6-6D7C71942130\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C226593-97C5-49C4-9906-88430D35A1A9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml30_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B479287E-D58C-432F-9B76-A6C75C4C1539\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml310e_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72BD3DC2-1148-47E8-956B-379214CB0847\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml310e_gen8_v2_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34846E13-5492-4B43-BFF7-DD68DC044DF2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22E0FE3B-24DB-416D-93FF-98CD64538A99\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml350e_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16078B36-0484-43E1-91EB-507403E469FB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml350e_gen8_v2_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27B69F59-24E1-40E7-AD2A-D5C6A4E9D75C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml350p_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3DAD01F-2D0C-4055-9B68-73100C02A63E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_sl210t_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4976BD59-4074-4EB5-97EC-FA3E50C83245\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_sl230s_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88C7E69C-68FC-4BB5-845E-AC78AE6213E9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_sl250s_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07646416-DC91-44C2-AEC3-2F979C9C89B5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_sl270s_gen8_se_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FEF9B53-21AA-43F8-82B6-476F04D0498D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_sl270s_gen8_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F77695B-AE96-4A78-B818-451408BFED3A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_sl4540_gen8_3_node_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A191A1E-ED89-4E71-A113-CAB3148D9771\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ws460c_gen8_graphics_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61A6ED7F-9F9C-47E1-B947-36175C7864E3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B60147E9-D2AA-4B5C-9975-F27921BCF547\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F3A643B-F7DA-4239-BF5D-CCB2ECD4AB46\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C3E0225-79B8-47EE-AA0F-F35D69FA2905\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl220a_gen8_v2_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B33E1DFC-4274-4488-9D64-E37D0CC4B055\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8FC258B-754A-4372-ADF1-1F2BBDA8CE54\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D871D279-38D4-48EE-8966-C2B686390E1A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A165E3C1-14E8-421E-807A-3888B204E105\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC8A90D2-7C7F-42FA-9F35-34C2D9612C03\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl740f_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B29CFA7E-6485-4FA0-816B-0CCA98BB77BE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl750f_gen9_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB222D02-E0CD-4BD2-BFED-50FC0EB8BA48\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F9CD561-6392-4F85-9D81-7A39BA8E518B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hp:integrated_lights-out_5:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.31\", \"matchCriteriaId\": \"53905D4D-26A8-49B2-9AB5-C8E04B2B7712\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7E4EA1D-8ACB-4C6C-AB96-80BC8FD71FB3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:apollo_4510_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D87366D-D719-46A8-AE28-455155C8D359\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9311154A-E0EF-46B3-B8D0-6ED540029684\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:convergedsystem_cs700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07452929-D568-4D48-9480-6F03AD39EBC8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:convergedsystem_cs700x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72DE103E-83D9-4A9C-BB91-F876448443CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03E00679-A2A7-4A51-9764-462BF479F423\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B553E44A-A209-49CA-A914-CC1FE51D90D8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"666AAAE5-83AB-4018-891D-2FC69AE6AD65\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DD32E61-4FFE-4ECF-9582-B96D1513C706\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BDF28CD-B01A-4C31-B62A-0472AD96D255\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5F7BC4-EAA0-47EB-A66A-B5BC60620E1F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58196CA6-BA67-4361-8056-B52B1A323E5D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5FC76C8-44FC-4BCC-95C1-0717126BBE2A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFD8AB8C-D5BA-4312-9E7A-48ECB09F3C16\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBF5E039-BBBF-42A4-8F57-CB2B7E65D763\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"306B6EC0-C471-48B6-858C-93A4A6CB976D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A16D30B-D064-4EEC-9628-7B64B63CE2CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A367F8FE-8500-4512-831A-408BB0772586\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"358CD445-B506-4EE9-A282-76A790EA4583\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D857745-3DBE-4B0A-ACE3-0159EB3D0121\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9DB2958-DDCD-4ACA-B9C1-F7914622E36B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8A0F022-C271-4DB6-A12E-1A2357C0BFE9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29DEE638-BD6B-4B70-ABEE-AFD8FDA99F45\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7B1F484-2258-4326-AEFA-725BD8EFE6CD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00D87480-CB71-4BB0-A034-41B3AA9F10A4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81B8CA7A-F115-4932-A932-F61180E79A72\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BD2C870-A12D-470A-94A7-DD31C4E8AB0B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44B8A537-DF37-4D7C-8290-5254A788D087\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"A potential security vulnerability has been identified in HPE Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4) firmware. The vulnerability could be remotely exploited to disclose the serial number and other information.\"}, {\"lang\": \"es\", \"value\": \"Se ha identificado una vulnerabilidad de seguridad potencial en el firmware HPE Integrated Lights-Out versi\\u00f3n 5 (iLO 5) e Integrated Lights-Out versi\\u00f3n 4 (iLO 4).\u0026#xa0;La vulnerabilidad podr\\u00eda ser explotada remotamente para divulgar el n\\u00famero de serie y otra informaci\\u00f3n\"}]", "id": "CVE-2020-7202", "lastModified": "2024-11-21T05:36:49.233", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2021-01-05T15:15:14.077", "references": "[{\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04069en_us\", \"source\": \"security-alert@hpe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04069en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "security-alert@hpe.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2020-7202\",\"sourceIdentifier\":\"security-alert@hpe.com\",\"published\":\"2021-01-05T15:15:14.077\",\"lastModified\":\"2024-11-21T05:36:49.233\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A potential security vulnerability has been identified in HPE Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 4 (iLO 4) firmware. The vulnerability could be remotely exploited to disclose the serial number and other information.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad de seguridad potencial en el firmware HPE Integrated Lights-Out versi\u00f3n 5 (iLO 5) e Integrated Lights-Out versi\u00f3n 4 (iLO 4).\u0026#xa0;La vulnerabilidad podr\u00eda ser explotada remotamente para divulgar el n\u00famero de serie y otra informaci\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:integrated_lights-out_4:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.76\",\"matchCriteriaId\":\"728B6275-69A0-4235-B877-A80EAA5AE662\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:apollo_4200_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C145C31-ED51-48CA-AC14-53A46F3DA0B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:convergedsystem_cs700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07452929-D568-4D48-9480-6F03AD39EBC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:convergedsystem_cs700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72DE103E-83D9-4A9C-BB91-F876448443CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_bl420c_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE085EBF-9338-4F4D-BA6D-DF71EB55809D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_bl460c_gen8_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7C5EE27-AC35-490B-AF26-FDA261AA03B5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB98203-AFC1-489F-BA7D-F66E3275774A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_bl465c_gen8_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E16A3168-F12A-47D9-B80B-11815DDAA24E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_bl660c_gen8_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5E3FC67-8EBC-4EE9-B518-561602DD617F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66EB270B-9289-4D3D-91A8-751CF2C62BD5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2483ED79-0132-4484-808B-8DA9F2F9CE1E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl160_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35D7105B-54F9-480D-95B6-9BFACD405450\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFADFAB1-F9C7-4613-AB00-6088A54B2984\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFBF3AAB-5A41-498D-8934-5069086AF0A4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl320e_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10ED119-2AFB-4A19-8EC9-11DD00C771C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl320e_gen8_v2_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB4D64F-C78D-4A5A-8213-85607DD5DC3D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5562E797-E2BA-49A7-A7FD-F345F3B3EDC1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl360e_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE32C218-B3DC-4915-A170-D41EA356B37F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl360p_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"971D98CB-488B-475E-834F-D7F2C2D15618\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4176A85-6BA7-4A49-95A6-759655FCE437\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl380e_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2B60FD7-710F-4596-AC1E-C92BE1F73185\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl380p_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"089A9561-E2E3-4E6C-8E2A-3E0559306B9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl385p_gen8_\\\\(amd\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF8D7D0-50A7-45CE-8C57-2BF809D6D467\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl560_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B0B6A0E-982B-49F8-9CD8-675599E801DA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C250444-6DCB-492C-9C09-BCB4D8F9522E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl580_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD283162-B57B-4041-A36D-70C15C5CAD2B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E11FBED-28C9-4D77-BCE4-847115EC5A56\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D1BA51-A089-4CB6-8B7A-44B29BE38D65\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"501CE644-836D-45D7-A525-00443E496279\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_microserver_gen8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2D4A053-A170-41E8-85A6-6D7C71942130\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C226593-97C5-49C4-9906-88430D35A1A9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml30_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B479287E-D58C-432F-9B76-A6C75C4C1539\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml310e_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BD3DC2-1148-47E8-956B-379214CB0847\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml310e_gen8_v2_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34846E13-5492-4B43-BFF7-DD68DC044DF2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E0FE3B-24DB-416D-93FF-98CD64538A99\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml350e_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16078B36-0484-43E1-91EB-507403E469FB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml350e_gen8_v2_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B69F59-24E1-40E7-AD2A-D5C6A4E9D75C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml350p_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3DAD01F-2D0C-4055-9B68-73100C02A63E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_sl210t_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4976BD59-4074-4EB5-97EC-FA3E50C83245\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_sl230s_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C7E69C-68FC-4BB5-845E-AC78AE6213E9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_sl250s_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07646416-DC91-44C2-AEC3-2F979C9C89B5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_sl270s_gen8_se_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FEF9B53-21AA-43F8-82B6-476F04D0498D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_sl270s_gen8_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F77695B-AE96-4A78-B818-451408BFED3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_sl4540_gen8_3_node_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A191A1E-ED89-4E71-A113-CAB3148D9771\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ws460c_gen8_graphics_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A6ED7F-9F9C-47E1-B947-36175C7864E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B60147E9-D2AA-4B5C-9975-F27921BCF547\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F3A643B-F7DA-4239-BF5D-CCB2ECD4AB46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3E0225-79B8-47EE-AA0F-F35D69FA2905\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl220a_gen8_v2_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B33E1DFC-4274-4488-9D64-E37D0CC4B055\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8FC258B-754A-4372-ADF1-1F2BBDA8CE54\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D871D279-38D4-48EE-8966-C2B686390E1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A165E3C1-14E8-421E-807A-3888B204E105\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC8A90D2-7C7F-42FA-9F35-34C2D9612C03\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl740f_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B29CFA7E-6485-4FA0-816B-0CCA98BB77BE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl750f_gen9_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB222D02-E0CD-4BD2-BFED-50FC0EB8BA48\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9CD561-6392-4F85-9D81-7A39BA8E518B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:integrated_lights-out_5:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.31\",\"matchCriteriaId\":\"53905D4D-26A8-49B2-9AB5-C8E04B2B7712\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E4EA1D-8ACB-4C6C-AB96-80BC8FD71FB3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:apollo_4510_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D87366D-D719-46A8-AE28-455155C8D359\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9311154A-E0EF-46B3-B8D0-6ED540029684\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:convergedsystem_cs700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07452929-D568-4D48-9480-6F03AD39EBC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:convergedsystem_cs700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72DE103E-83D9-4A9C-BB91-F876448443CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E00679-A2A7-4A51-9764-462BF479F423\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B553E44A-A209-49CA-A914-CC1FE51D90D8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"666AAAE5-83AB-4018-891D-2FC69AE6AD65\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD32E61-4FFE-4ECF-9582-B96D1513C706\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BDF28CD-B01A-4C31-B62A-0472AD96D255\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5F7BC4-EAA0-47EB-A66A-B5BC60620E1F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58196CA6-BA67-4361-8056-B52B1A323E5D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5FC76C8-44FC-4BCC-95C1-0717126BBE2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD8AB8C-D5BA-4312-9E7A-48ECB09F3C16\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBF5E039-BBBF-42A4-8F57-CB2B7E65D763\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"306B6EC0-C471-48B6-858C-93A4A6CB976D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A16D30B-D064-4EEC-9628-7B64B63CE2CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A367F8FE-8500-4512-831A-408BB0772586\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"358CD445-B506-4EE9-A282-76A790EA4583\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D857745-3DBE-4B0A-ACE3-0159EB3D0121\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9DB2958-DDCD-4ACA-B9C1-F7914622E36B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8A0F022-C271-4DB6-A12E-1A2357C0BFE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29DEE638-BD6B-4B70-ABEE-AFD8FDA99F45\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7B1F484-2258-4326-AEFA-725BD8EFE6CD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00D87480-CB71-4BB0-A034-41B3AA9F10A4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81B8CA7A-F115-4932-A932-F61180E79A72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BD2C870-A12D-470A-94A7-DD31C4E8AB0B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B8A537-DF37-4D7C-8290-5254A788D087\"}]}]}],\"references\":[{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04069en_us\",\"source\":\"security-alert@hpe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04069en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.