cve-2022-28633
Vulnerability from cvelistv5
Published
2022-08-11 17:18
Modified
2024-08-03 05:56
Severity ?
EPSS score ?
Summary
A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | HPE Integrated Lights-Out 5 (iLO 5) |
Version: Prior to 2.71 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:56:16.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HPE Integrated Lights-Out 5 (iLO 5)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Prior to 2.71" } ] } ], "descriptions": [ { "lang": "en", "value": "A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)." } ], "problemTypes": [ { "descriptions": [ { "description": "local disclosure of sensitive information and local unauthorized data modification", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T17:18:12", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2022-28633", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HPE Integrated Lights-Out 5 (iLO 5)", "version": { "version_data": [ { "version_value": "Prior to 2.71" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "local disclosure of sensitive information and local unauthorized data modification" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us", "refsource": "MISC", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2022-28633", "datePublished": "2022-08-11T17:18:12", "dateReserved": "2022-04-04T00:00:00", "dateUpdated": "2024-08-03T05:56:16.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.71\", \"matchCriteriaId\": \"50DE87E4-C7BA-45DF-A8D2-82278A87ECEA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03743177-70D4-442B-B59F-43912385CC83\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFB818A6-80D5-4DD7-8E0D-EC25764A0693\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25418088-0890-401E-837C-611154B2C433\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1480B92-9A59-4675-B2DF-6DAE385927B2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC09C72C-0BD3-4DB1-96C6-72F2330D4165\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB23B5E3-887B-41C8-B83E-0203BEC9DDB1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33A5C2F7-66E1-483F-95E7-D51C6D32E7CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A478D98-EE4E-45ED-A257-F154693E6FB2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CAC257C-8594-454D-BA28-5D98F03AF3EC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AC36ED1-D392-4DC6-B3E0-99A821705AA2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D0ACC75-47E9-439A-9338-170478FB326F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C25FD273-0E16-4975-985C-8BD96AE0D449\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"554BD1A9-19DC-40E7-875F-2C6091CDC904\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5876FB45-B037-4355-BAE9-69157FD0A402\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0C77CAF-0A18-4447-93BD-C64595475E37\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08D81BA5-E5D8-4D42-8C42-A91063008359\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA978EC2-6027-4605-BECC-68B4682DB5E5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B15D52EA-CE63-47AF-993D-265163B5B38E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1F98CB6-3933-4425-A7E9-542AB764C8C4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A91E7E91-BED2-4CFE-AB7A-8537F1A589C8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93765BE7-D8C2-48C8-9ADA-A7C36B993D95\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BE801CF-95AB-409A-8063-9525FC1A3BF1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A540039-4339-44CE-92AD-83B80928FC81\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD08B95A-240C-436E-91B5-2D594F6F1F07\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7151CE9-BAD2-47B8-9283-5BEB53C93D98\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E27B2E8E-1F1D-4397-BE33-80755D6BE56C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8545248A-2943-4B8D-A295-BE7D43492BC9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00B032E4-9663-4525-ACC4-217B5E266124\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61758FDD-0744-4207-950E-D11717E9E5D1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3845235-CAFC-4FB3-AB26-F0E8A8815F88\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8389F7F-7653-4695-91CC-DCFACC870094\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"419470B4-80EF-46BF-8DB4-6569D3E8435F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7591DA99-B0CA-4A23-A8C5-C6D9084C2329\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D176EE5-FDE7-475B-802A-AFD21A9F6E87\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18B76D60-5493-4959-A85E-91C1D810365F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40D9CF07-D08E-4B36-B25D-1011AF0463DA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26D8AA54-634D-4870-AC5E-BD8F70EDB83D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8464FB6E-5744-44B7-BD1F-87D8F382A30B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2C8768C-5E7D-4C11-8C49-182CC1D643B0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"594B767B-41AB-436A-AF2C-10185E1161F4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"779A6A62-4357-46FF-9BA8-F53E657A4E31\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B00D29DB-B073-4C5A-934D-87A311D57657\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5869DE25-F914-48E0-8AFF-72C463E99084\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"174EF59C-18A6-4490-A23A-76E74C1D2AFA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C755817B-B074-4496-934B-A30C72A4F849\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E79D5665-6654-4AF7-A3DE-7F338067E8C3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F8B5AC2-7889-4654-88D2-289CE20A4ED7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB32875E-11E3-443E-809C-12CCAE574570\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5527AD20-7E19-4987-915D-FCFFEBFDA4C6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76C24685-FEE2-494F-9806-56477E62FD1A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7DE16BA-939E-4C26-B03B-439E60C7C872\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B224273-2E15-41F2-84D6-D754F6B76B49\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ACD7139-05F6-4D60-BB0F-9AA6952720CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01181BEB-DE0B-49AA-B632-91B40046120F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9334B70C-EBBD-4D0F-A0DC-EC84E014701E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50247A44-3EA0-4B4B-9AB6-64D9B470F190\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A21F0B8-D613-46CD-BAEC-5CD876FD5352\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EDA2E27-1E51-4DC3-A907-C6273168D366\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"424298C0-01E2-4770-818D-25F47A801F88\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E7408A4-7409-4223-ABA7-C1F35E84D213\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0700905D-BEA8-46A7-95D4-27BC3793FA51\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBCBE981-8F98-49B2-B09D-B0187D5DF322\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A9E7335-3545-4F2D-A915-AB6B34EBB76D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC69BAD-3243-405F-839E-8BE9E2562205\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C386FE40-4223-4F35-A04A-84008B7A1B8E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3E86E62-1B51-4934-B8B6-40D920BE6192\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5D34B52-2803-43B0-942A-F974CBE14531\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFC53F93-901B-40A9-BAAD-DD5A8865E824\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3A06978-A8B5-4251-955F-2DF206962605\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D82CC8E6-A017-406E-B993-4CFFEB230829\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).\"}, {\"lang\": \"es\", \"value\": \"Se ha detectado una divulgaci\\u00f3n local de informaci\\u00f3n confidencial y una vulnerabilidad local de modificaci\\u00f3n de datos no autorizada en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\\u00eda explotar localmente esta vulnerabilidad para leer y escribir en el sistema de archivos del firmware de iLO 5 resultando en una p\\u00e9rdida completa de confidencialidad y una p\\u00e9rdida parcial de integridad y disponibilidad. HPE ha proporcionado una actualizaci\\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5).\"}]", "id": "CVE-2022-28633", "lastModified": "2024-11-21T06:57:37.317", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.5, \"impactScore\": 4.7}]}", "published": "2022-08-12T15:15:14.337", "references": "[{\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us\", \"source\": \"security-alert@hpe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "security-alert@hpe.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2022-28633\",\"sourceIdentifier\":\"security-alert@hpe.com\",\"published\":\"2022-08-12T15:15:14.337\",\"lastModified\":\"2024-11-21T06:57:37.317\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).\"},{\"lang\":\"es\",\"value\":\"Se ha detectado una divulgaci\u00f3n local de informaci\u00f3n confidencial y una vulnerabilidad local de modificaci\u00f3n de datos no autorizada en HPE Integrated Lights-Out 5 (iLO 5) versiones de firmware anteriores a 2.71. Un usuario no privilegiado podr\u00eda explotar localmente esta vulnerabilidad para leer y escribir en el sistema de archivos del firmware de iLO 5 resultando en una p\u00e9rdida completa de confidencialidad y una p\u00e9rdida parcial de integridad y disponibilidad. HPE ha proporcionado una actualizaci\u00f3n de firmware para resolver esta vulnerabilidad en HPE Integrated Lights-Out 5 (iLO 5).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.5,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.71\",\"matchCriteriaId\":\"50DE87E4-C7BA-45DF-A8D2-82278A87ECEA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03743177-70D4-442B-B59F-43912385CC83\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB818A6-80D5-4DD7-8E0D-EC25764A0693\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25418088-0890-401E-837C-611154B2C433\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1480B92-9A59-4675-B2DF-6DAE385927B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC09C72C-0BD3-4DB1-96C6-72F2330D4165\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB23B5E3-887B-41C8-B83E-0203BEC9DDB1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A5C2F7-66E1-483F-95E7-D51C6D32E7CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A478D98-EE4E-45ED-A257-F154693E6FB2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CAC257C-8594-454D-BA28-5D98F03AF3EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AC36ED1-D392-4DC6-B3E0-99A821705AA2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0ACC75-47E9-439A-9338-170478FB326F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C25FD273-0E16-4975-985C-8BD96AE0D449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"554BD1A9-19DC-40E7-875F-2C6091CDC904\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5876FB45-B037-4355-BAE9-69157FD0A402\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0C77CAF-0A18-4447-93BD-C64595475E37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D81BA5-E5D8-4D42-8C42-A91063008359\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA978EC2-6027-4605-BECC-68B4682DB5E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15D52EA-CE63-47AF-993D-265163B5B38E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F98CB6-3933-4425-A7E9-542AB764C8C4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A91E7E91-BED2-4CFE-AB7A-8537F1A589C8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93765BE7-D8C2-48C8-9ADA-A7C36B993D95\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BE801CF-95AB-409A-8063-9525FC1A3BF1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A540039-4339-44CE-92AD-83B80928FC81\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD08B95A-240C-436E-91B5-2D594F6F1F07\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7151CE9-BAD2-47B8-9283-5BEB53C93D98\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E27B2E8E-1F1D-4397-BE33-80755D6BE56C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8545248A-2943-4B8D-A295-BE7D43492BC9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B032E4-9663-4525-ACC4-217B5E266124\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61758FDD-0744-4207-950E-D11717E9E5D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3845235-CAFC-4FB3-AB26-F0E8A8815F88\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8389F7F-7653-4695-91CC-DCFACC870094\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419470B4-80EF-46BF-8DB4-6569D3E8435F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7591DA99-B0CA-4A23-A8C5-C6D9084C2329\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1642BAB-2EC5-4E89-86DE-7B9BECA4F6CB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D176EE5-FDE7-475B-802A-AFD21A9F6E87\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B76D60-5493-4959-A85E-91C1D810365F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40D9CF07-D08E-4B36-B25D-1011AF0463DA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D8AA54-634D-4870-AC5E-BD8F70EDB83D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8464FB6E-5744-44B7-BD1F-87D8F382A30B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C8768C-5E7D-4C11-8C49-182CC1D643B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"594B767B-41AB-436A-AF2C-10185E1161F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"779A6A62-4357-46FF-9BA8-F53E657A4E31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B00D29DB-B073-4C5A-934D-87A311D57657\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5869DE25-F914-48E0-8AFF-72C463E99084\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"174EF59C-18A6-4490-A23A-76E74C1D2AFA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C755817B-B074-4496-934B-A30C72A4F849\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79D5665-6654-4AF7-A3DE-7F338067E8C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8B5AC2-7889-4654-88D2-289CE20A4ED7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB32875E-11E3-443E-809C-12CCAE574570\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5527AD20-7E19-4987-915D-FCFFEBFDA4C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C24685-FEE2-494F-9806-56477E62FD1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7DE16BA-939E-4C26-B03B-439E60C7C872\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B224273-2E15-41F2-84D6-D754F6B76B49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ACD7139-05F6-4D60-BB0F-9AA6952720CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01181BEB-DE0B-49AA-B632-91B40046120F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9334B70C-EBBD-4D0F-A0DC-EC84E014701E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50247A44-3EA0-4B4B-9AB6-64D9B470F190\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A21F0B8-D613-46CD-BAEC-5CD876FD5352\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDA2E27-1E51-4DC3-A907-C6273168D366\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD81201-ECD9-4E9F-A6F0-7EAEB1DA9891\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"424298C0-01E2-4770-818D-25F47A801F88\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E7408A4-7409-4223-ABA7-C1F35E84D213\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0700905D-BEA8-46A7-95D4-27BC3793FA51\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBCBE981-8F98-49B2-B09D-B0187D5DF322\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A9E7335-3545-4F2D-A915-AB6B34EBB76D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC69BAD-3243-405F-839E-8BE9E2562205\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C386FE40-4223-4F35-A04A-84008B7A1B8E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3E86E62-1B51-4934-B8B6-40D920BE6192\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D34B52-2803-43B0-942A-F974CBE14531\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFC53F93-901B-40A9-BAAD-DD5A8865E824\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3A06978-A8B5-4251-955F-2DF206962605\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D82CC8E6-A017-406E-B993-4CFFEB230829\"}]}]}],\"references\":[{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us\",\"source\":\"security-alert@hpe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf04333en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.