Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D075214A-20A3-4AA2-A35B-9B5F6DE26CF4", "versionEndIncluding": "3.9.1.0", "versionStartIncluding": "3.1.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D18184C8-9D04-4F7C-A6AA-59BA85CB1577", "versionEndIncluding": "4.5.4.0", "versionStartIncluding": "4.1.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B9295BF-5CF6-470F-AAAB-C24CB23C0406", "versionEndIncluding": "5.0.7.0", "versionStartIncluding": "5.0.1.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*", "matchCriteriaId": "66A86334-CC9B-4D33-AE33-E4B2F07CCC5D", "versionEndIncluding": "5.1.2.0", "versionStartIncluding": "5.1.0.0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:hpe:nimble_storage_af20_all_flash_array:-:*:*:*:*:*:*:*", "matchCriteriaId": "80CF1BE0-0224-4190-BBC6-7D4373234E85", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_af20q_all_flash_dual_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5E0887F-E894-4821-A171-96D758A8F8CE", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_af40_all_flash_dual_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "14AC79A7-DDF9-4212-AAEC-458FA7E5E06A", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_af60_all_flash_dual_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7985641-BC1A-42B6-8B61-147848AB77AF", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_af80_all_flash_dual_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "508699FE-1F81-43EE-848F-203420217356", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_cs3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFD2E78D-2C8F-46BA-804C-10110687F148", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_cs5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB8C5FF4-BF19-4E0C-BDED-AEBE75E95D7C", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_cs7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "009451E7-756D-47DD-954F-5041389E7C36", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_secondary_flash_arrays:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD1E0DC2-CBA3-4921-8458-705F6709E3D5", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Potential security vulnerabilities have been identified with HPE Nimble Storage systems in multi array group configurations. The vulnerabilities could be exploited by an attacker to gain elevated privileges on the array. The following NimbleOS versions, and all subsequent releases, contain a software fix for this vulnerability: 3.9.2.0, 4.5.5.0, 5.0.8.0 and 5.1.3.0."}, {"lang": "es", "value": "Han sido identificadas posibles vulnerabilidades de seguridad con los sistemas HPE Nimble Storage en configuraciones de grupos de m\u00faltiples matrices. Las vulnerabilidades podr\u00edan ser explotadas por un atacante para obtener privilegios elevados en la matriz. Las siguientes versiones de NimbleOS, y todas las versiones posteriores, contienen una correcci\u00f3n de software para esta vulnerabilidad: 3.9.2.0, 4.5.5.0, 5.0.8.0 y 5.1.3.0."}], "id": "CVE-2019-11996", "lastModified": "2024-11-21T04:22:07.827", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-11-07T19:15:14.017", "references": [{"source": "security-alert@hpe.com", "tags": ["Vendor Advisory"], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03964en_us"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03964en_us"}], "sourceIdentifier": "security-alert@hpe.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}