Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED4835A-3E32-4A49-A4AB-34C70B4B5104", "versionEndIncluding": "3.9.3.0", "versionStartIncluding": "3.1.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A2C0C83-5678-41EC-A684-DF92D20B1F44", "versionEndIncluding": "4.5.6.0", "versionStartIncluding": "4.1.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7190EA9-2B90-4499-99E3-7A1B3DC178EC", "versionEndIncluding": "5.0.9.0", "versionStartIncluding": "5.0.1.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FC12F4A-EB6E-40C9-ACD1-13543D059C15", "versionEndIncluding": "5.1.4.100", "versionStartIncluding": "5.1.0.0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:hpe:nimble_storage_af20_all_flash_array:-:*:*:*:*:*:*:*", "matchCriteriaId": "80CF1BE0-0224-4190-BBC6-7D4373234E85", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_af20q_all_flash_dual_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5E0887F-E894-4821-A171-96D758A8F8CE", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_af40_all_flash_dual_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "14AC79A7-DDF9-4212-AAEC-458FA7E5E06A", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_af60_all_flash_dual_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7985641-BC1A-42B6-8B61-147848AB77AF", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_af80_all_flash_dual_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "508699FE-1F81-43EE-848F-203420217356", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_cs3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFD2E78D-2C8F-46BA-804C-10110687F148", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_cs5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB8C5FF4-BF19-4E0C-BDED-AEBE75E95D7C", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_cs7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "009451E7-756D-47DD-954F-5041389E7C36", "vulnerable": false}, {"criteria": "cpe:2.3:h:hpe:nimble_storage_secondary_flash_arrays:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD1E0DC2-CBA3-4921-8458-705F6709E3D5", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Potential remote code execution security vulnerabilities have been identified with HPE Nimble Storage systems that could be exploited by an attacker to gain elevated privileges on the array. The following NimbleOS versions, and all subsequent releases, contain a software fix for this vulnerability: 3.9.3.0 4.5.6.0 5.0.9.0 5.1.4.100"}, {"lang": "es", "value": "Se han identificado potenciales vulnerabilidades de seguridad en la ejecuci\u00f3n de c\u00f3digo remota con los sistemas HPE Nimble Storage que podr\u00edan ser explotadas por un atacante para alcanzar privilegios elevados en la matriz. Las siguientes versiones de NimbleOS, y todas las posteriores, contienen una correcci\u00f3n de software para esta vulnerabilidad: 3.9.3.0 4.5.6.0 5.0.9.0 5.1.4.100"}], "id": "CVE-2020-7138", "lastModified": "2024-11-21T05:36:41.923", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-05-19T23:15:09.867", "references": [{"source": "security-alert@hpe.com", "tags": ["Vendor Advisory"], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03992en_us"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03992en_us"}], "sourceIdentifier": "security-alert@hpe.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}