cve-2023-30911
Vulnerability from cvelistv5
Published
2023-10-18 17:04
Modified
2024-09-13 17:29
Summary
HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:37:15.495Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-30911",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-13T17:29:30.659519Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-13T17:29:55.595Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "HPE Integrated Lights-Out",
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "versions": [
            {
              "lessThan": "iLO 5 v2.98",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "iLO 6 v1.53",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service."
            }
          ],
          "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-18T17:04:56.957Z",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2023-30911",
    "datePublished": "2023-10-18T17:04:35.447Z",
    "dateReserved": "2023-04-20T16:58:53.926Z",
    "dateUpdated": "2024-09-13T17:29:55.595Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.98\", \"matchCriteriaId\": \"DAF9FFD1-73D6-40AD-849B-EB4749B5AAE3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_2000_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6135F141-E7EE-4DCE-988F-62F7B5815EBA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BF55930-EC9C-4C0D-8092-3E1091902D4B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFB818A6-80D5-4DD7-8E0D-EC25764A0693\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25418088-0890-401E-837C-611154B2C433\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1480B92-9A59-4675-B2DF-6DAE385927B2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC09C72C-0BD3-4DB1-96C6-72F2330D4165\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB23B5E3-887B-41C8-B83E-0203BEC9DDB1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33A5C2F7-66E1-483F-95E7-D51C6D32E7CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_r2200_gen10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3FF527B-51BF-445B-80D0-42FD50D6F60A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A478D98-EE4E-45ED-A257-F154693E6FB2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CAC257C-8594-454D-BA28-5D98F03AF3EC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AC36ED1-D392-4DC6-B3E0-99A821705AA2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D0ACC75-47E9-439A-9338-170478FB326F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C25FD273-0E16-4975-985C-8BD96AE0D449\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"554BD1A9-19DC-40E7-875F-2C6091CDC904\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0C77CAF-0A18-4447-93BD-C64595475E37\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08D81BA5-E5D8-4D42-8C42-A91063008359\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA978EC2-6027-4605-BECC-68B4682DB5E5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B15D52EA-CE63-47AF-993D-265163B5B38E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1F98CB6-3933-4425-A7E9-542AB764C8C4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A91E7E91-BED2-4CFE-AB7A-8537F1A589C8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BE801CF-95AB-409A-8063-9525FC1A3BF1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A540039-4339-44CE-92AD-83B80928FC81\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD08B95A-240C-436E-91B5-2D594F6F1F07\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7151CE9-BAD2-47B8-9283-5BEB53C93D98\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E27B2E8E-1F1D-4397-BE33-80755D6BE56C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8545248A-2943-4B8D-A295-BE7D43492BC9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00B032E4-9663-4525-ACC4-217B5E266124\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61758FDD-0744-4207-950E-D11717E9E5D1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3845235-CAFC-4FB3-AB26-F0E8A8815F88\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8389F7F-7653-4695-91CC-DCFACC870094\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"419470B4-80EF-46BF-8DB4-6569D3E8435F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"174EF59C-18A6-4490-A23A-76E74C1D2AFA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C755817B-B074-4496-934B-A30C72A4F849\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E79D5665-6654-4AF7-A3DE-7F338067E8C3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F8B5AC2-7889-4654-88D2-289CE20A4ED7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_microserver_gen10_plus_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCB4EDC6-F7DA-4DCD-AB0B-BCCD5B4776DC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB32875E-11E3-443E-809C-12CCAE574570\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5527AD20-7E19-4987-915D-FCFFEBFDA4C6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76C24685-FEE2-494F-9806-56477E62FD1A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7DE16BA-939E-4C26-B03B-439E60C7C872\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B224273-2E15-41F2-84D6-D754F6B76B49\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ACD7139-05F6-4D60-BB0F-9AA6952720CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01181BEB-DE0B-49AA-B632-91B40046120F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9334B70C-EBBD-4D0F-A0DC-EC84E014701E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50247A44-3EA0-4B4B-9AB6-64D9B470F190\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A21F0B8-D613-46CD-BAEC-5CD876FD5352\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72F58441-4DFB-42F3-AA93-500AAF712D1B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"424298C0-01E2-4770-818D-25F47A801F88\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E7408A4-7409-4223-ABA7-C1F35E84D213\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C3D137A-E744-4543-83DF-7B0E01F4456C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"853AF641-B81C-4FB7-89AB-EACF420F0C62\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F15301B-B695-4DC8-9EE5-517AC2E64778\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19188281-533B-450E-84F1-089F3300D08E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hpe:integrated_lights-out_6_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.53\", \"matchCriteriaId\": \"46E5BFA5-D47B-4D7D-9328-9210F5289934\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:alletra_4110:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F66E9860-0CC6-4C51-9B1D-D56CBD1F231B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:alletra_4120:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F95280DF-C0DD-4685-9F1E-5B8F2BA8CFD7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:alletra_4140:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB18DECF-4A39-4970-BE37-7C19818BD78A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl110_gen11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3F028DB-68DF-4551-9D52-99D02F5DDBD3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl20_gen11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2378D39A-9737-4681-A724-1CF9B252D29E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl320_gen11_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D01E2C9-76B7-4C23-A9B4-7BFB90F7F848\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl325_gen11_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B8A4A0C-A33A-48E5-8F53-807A20333DE9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl345_gen11_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37DFB5BE-E36B-4D5D-AC60-267799B6AEF9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl360_gen11_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE19E0B8-B23C-41E0-82DA-BEFBCDC7954A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl365_gen11_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8E5A73F-96A5-4488-8DAE-3ECBEAD71CE9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl380_gen11_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05AF31FE-6C42-4D64-A216-7FD5383D50F5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl380a_gen11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A576DB6-E28A-44F3-9D02-AB6DB197589D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl385_gen11_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36449636-2501-4608-968D-9E73090A4D43\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_dl560_gen11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8E15353-5528-4630-87CE-1D1304C13E97\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml110_gen11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79E6B854-C81C-4D33-856F-6BBE7AA38863\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml30_gen11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADDD6399-8558-4642-83FF-B0F8E370F549\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_ml350_gen11_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A24D0AE-55B8-438A-B956-3A20F34382F2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:proliant_rl300_gen11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEC202C6-AD3B-4C2C-9BA6-3F5356EF30AC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:synergy_480_gen11_compute_module:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF809BB7-50A7-4477-A627-D63A3AE5AA18\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.\"}, {\"lang\": \"es\", \"value\": \"HPE Integrated Lights-Out 5 e Integrated Lights-Out 6 que utilizan iLOrest pueden provocar una Denegaci\\u00f3n de Servicio.\"}]",
      "id": "CVE-2023-30911",
      "lastModified": "2024-11-21T08:01:03.383",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-alert@hpe.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 4.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
      "published": "2023-10-18T18:15:09.033",
      "references": "[{\"url\": \"https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us\", \"source\": \"security-alert@hpe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security-alert@hpe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-30911\",\"sourceIdentifier\":\"security-alert@hpe.com\",\"published\":\"2023-10-18T18:15:09.033\",\"lastModified\":\"2024-11-21T08:01:03.383\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.\"},{\"lang\":\"es\",\"value\":\"HPE Integrated Lights-Out 5 e Integrated Lights-Out 6 que utilizan iLOrest pueden provocar una Denegaci\u00f3n de Servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-alert@hpe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.98\",\"matchCriteriaId\":\"DAF9FFD1-73D6-40AD-849B-EB4749B5AAE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_2000_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6135F141-E7EE-4DCE-988F-62F7B5815EBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BF55930-EC9C-4C0D-8092-3E1091902D4B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB818A6-80D5-4DD7-8E0D-EC25764A0693\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25418088-0890-401E-837C-611154B2C433\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1480B92-9A59-4675-B2DF-6DAE385927B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC09C72C-0BD3-4DB1-96C6-72F2330D4165\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB23B5E3-887B-41C8-B83E-0203BEC9DDB1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A5C2F7-66E1-483F-95E7-D51C6D32E7CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_r2200_gen10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3FF527B-51BF-445B-80D0-42FD50D6F60A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A478D98-EE4E-45ED-A257-F154693E6FB2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CAC257C-8594-454D-BA28-5D98F03AF3EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AC36ED1-D392-4DC6-B3E0-99A821705AA2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0ACC75-47E9-439A-9338-170478FB326F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C25FD273-0E16-4975-985C-8BD96AE0D449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"554BD1A9-19DC-40E7-875F-2C6091CDC904\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0C77CAF-0A18-4447-93BD-C64595475E37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D81BA5-E5D8-4D42-8C42-A91063008359\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA978EC2-6027-4605-BECC-68B4682DB5E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15D52EA-CE63-47AF-993D-265163B5B38E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F98CB6-3933-4425-A7E9-542AB764C8C4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A91E7E91-BED2-4CFE-AB7A-8537F1A589C8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BE801CF-95AB-409A-8063-9525FC1A3BF1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A540039-4339-44CE-92AD-83B80928FC81\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD08B95A-240C-436E-91B5-2D594F6F1F07\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7151CE9-BAD2-47B8-9283-5BEB53C93D98\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E27B2E8E-1F1D-4397-BE33-80755D6BE56C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8545248A-2943-4B8D-A295-BE7D43492BC9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B032E4-9663-4525-ACC4-217B5E266124\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61758FDD-0744-4207-950E-D11717E9E5D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3845235-CAFC-4FB3-AB26-F0E8A8815F88\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8389F7F-7653-4695-91CC-DCFACC870094\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419470B4-80EF-46BF-8DB4-6569D3E8435F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"174EF59C-18A6-4490-A23A-76E74C1D2AFA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C755817B-B074-4496-934B-A30C72A4F849\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79D5665-6654-4AF7-A3DE-7F338067E8C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8B5AC2-7889-4654-88D2-289CE20A4ED7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_microserver_gen10_plus_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB4EDC6-F7DA-4DCD-AB0B-BCCD5B4776DC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB32875E-11E3-443E-809C-12CCAE574570\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5527AD20-7E19-4987-915D-FCFFEBFDA4C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C24685-FEE2-494F-9806-56477E62FD1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7DE16BA-939E-4C26-B03B-439E60C7C872\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B224273-2E15-41F2-84D6-D754F6B76B49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ACD7139-05F6-4D60-BB0F-9AA6952720CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01181BEB-DE0B-49AA-B632-91B40046120F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9334B70C-EBBD-4D0F-A0DC-EC84E014701E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50247A44-3EA0-4B4B-9AB6-64D9B470F190\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A21F0B8-D613-46CD-BAEC-5CD876FD5352\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F58441-4DFB-42F3-AA93-500AAF712D1B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"424298C0-01E2-4770-818D-25F47A801F88\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E7408A4-7409-4223-ABA7-C1F35E84D213\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C3D137A-E744-4543-83DF-7B0E01F4456C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853AF641-B81C-4FB7-89AB-EACF420F0C62\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F15301B-B695-4DC8-9EE5-517AC2E64778\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19188281-533B-450E-84F1-089F3300D08E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:integrated_lights-out_6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.53\",\"matchCriteriaId\":\"46E5BFA5-D47B-4D7D-9328-9210F5289934\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:alletra_4110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F66E9860-0CC6-4C51-9B1D-D56CBD1F231B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:alletra_4120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F95280DF-C0DD-4685-9F1E-5B8F2BA8CFD7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:alletra_4140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB18DECF-4A39-4970-BE37-7C19818BD78A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl110_gen11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3F028DB-68DF-4551-9D52-99D02F5DDBD3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl20_gen11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2378D39A-9737-4681-A724-1CF9B252D29E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl320_gen11_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D01E2C9-76B7-4C23-A9B4-7BFB90F7F848\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl325_gen11_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B8A4A0C-A33A-48E5-8F53-807A20333DE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl345_gen11_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37DFB5BE-E36B-4D5D-AC60-267799B6AEF9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl360_gen11_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE19E0B8-B23C-41E0-82DA-BEFBCDC7954A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl365_gen11_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8E5A73F-96A5-4488-8DAE-3ECBEAD71CE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl380_gen11_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05AF31FE-6C42-4D64-A216-7FD5383D50F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl380a_gen11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A576DB6-E28A-44F3-9D02-AB6DB197589D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl385_gen11_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36449636-2501-4608-968D-9E73090A4D43\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_dl560_gen11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8E15353-5528-4630-87CE-1D1304C13E97\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml110_gen11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79E6B854-C81C-4D33-856F-6BBE7AA38863\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml30_gen11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADDD6399-8558-4642-83FF-B0F8E370F549\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_ml350_gen11_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A24D0AE-55B8-438A-B956-3A20F34382F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:proliant_rl300_gen11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEC202C6-AD3B-4C2C-9BA6-3F5356EF30AC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:synergy_480_gen11_compute_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF809BB7-50A7-4477-A627-D63A3AE5AA18\"}]}]}],\"references\":[{\"url\":\"https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us\",\"source\":\"security-alert@hpe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T14:37:15.495Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-30911\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-13T17:29:30.659519Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-13T17:29:48.517Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Hewlett Packard Enterprise (HPE)\", \"product\": \"HPE Integrated Lights-Out\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"iLO 5 v2.98\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"iLO 6 v1.53\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=hpesbhf04544en_us\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"eb103674-0d28-4225-80f8-39fb86215de0\", \"shortName\": \"hpe\", \"dateUpdated\": \"2023-10-18T17:04:56.957Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-30911\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-13T17:29:55.595Z\", \"dateReserved\": \"2023-04-20T16:58:53.926Z\", \"assignerOrgId\": \"eb103674-0d28-4225-80f8-39fb86215de0\", \"datePublished\": \"2023-10-18T17:04:35.447Z\", \"assignerShortName\": \"hpe\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.