Vulnerabilites related to Dell - PowerEdge
CVE-2025-36581 (GCVE-0-2025-36581)
Vulnerability from cvelistv5
- CWE-788 - Access of Memory Location After End of Buffer
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-36581", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T14:34:05.254583Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T14:34:35.216Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge", "vendor": "Dell", "versions": [ { "lessThan": "1.26.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell would like to thank codebreaker1337 for reporting this issue" } ], "datePublic": "2025-08-13T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell PowerEdge Platform version(s) 14G AMD BIOS v1.25.0 and prior, contain(s) an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure." } ], "value": "Dell PowerEdge Platform version(s) 14G AMD BIOS v1.25.0 and prior, contain(s) an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-788", "description": "CWE-788: Access of Memory Location After End of Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T14:00:11.677Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000356405/dsa-2025-299-security-update-for-dell-poweredge-server-bios-for-an-access-of-memory-location-after-end-of-buffer-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2025-36581", "datePublished": "2025-08-14T14:00:11.677Z", "dateReserved": "2025-04-15T21:30:44.885Z", "dateUpdated": "2025-08-14T14:34:35.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201307-0043
Vulnerability from variot
LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password. HP StoreVirtual products using LeftHand OS are prone to an unauthorized-access vulnerability. A remote attacker can exploit this issue to gain unauthorized access to the affected device. This may aid in further attacks. HP StoreVirtual Storage is a set of virtual storage devices supported by LeftHand OS of Hewlett-Packard (HP), which provides functions such as updating data centers, reducing SAN costs and eliminating failure points. LeftHand OS (aka SAN iQ) is an operating system used on this device. The vulnerability is caused by remote attacks. Password to gain the root authority of the user. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03825537
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03825537 Version: 2
HPSBST02896 rev.2 - HP StoreVirtual Storage, Remote Unauthorized Access
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2013-07-17 Last Updated: 2013-07-17
Potential Security Impact: Remote unauthorized access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with the HP StoreVirtual Storage.
All HP StoreVirtual Storage systems are equipped with a mechanism that allows HP support to access the underlying operating system if permission and access is provided by the customer. This functionality cannot be disabled today.
HP StoreVirtual products are storage appliances that use a custom operating system, LeftHand OS, which is not accessible to the end user. Limited access is available to the user via the HP StoreVirtual Command-Line Interface (CLiQ) however root access is blocked.
Root access may be requested by HP Support in some cases to help customers resolve complex support issues. To facilitate these cases, a challenge-response-based one-time password utility is employed by HP Support to gain root access to systems when the customer has granted permission and network access to the system. The one-time password utility protects the root access by preventing repeated access to the system with the same pass phrase. Root access to the LeftHand OS does not provide access to the user data being stored on the system.
References: CVE-2013-2352 (SSRT101257)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. This issue effects LeftHand OS (a.k.a. SAN iQ) software versions 10.5 and earlier.
HP StoreVirtual device
HP P4300
HP P4500
HP P4300 G2
HP P4500 G2
HP P4800 G2
HP P4900 G2
HP P4000 VSA
HP StoreVirtual 4130
HP StoreVirtual 4330
HP StoreVirtual 4530
HP StoreVirtual 4630
HP StoreVirtual 4730
HP StoreVirtual VSA
LeftHand NSM2060
LeftHand NSM2120
Dell PowerEdge 2950
HP DL320S
IBM System x3650
LeftHand NSM2060 G2
LeftHand NSM2120 G2
LeftHand VSA
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2013-2352 (AV:N/AC:L/Au:N/C:N/I:C/A:C) 9.4 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Joshua Small for reporting this issue to security-alert@hp.com
RESOLUTION
HP has provided patches to resolve this vulnerability. Please see the table below to determine which patch applies to the StoreVirtual version being used. Installation of patch 25051-00 will fail if 9.5 Patch Set 05 is not present
Note: HP Support may still request root access to customer systems in order to resolve certain support issues.
Patches and release notes may be downloaded using the 9.5 or later CMC. Go to http://www.hp.com/go/hpsc
Select your specific product. If you have a HP P4x00 G2 or HP StoreVirtual 4000 product select 'HP StoreVirtual 4000 Storage'. Select 'Drivers, Software & Firmware' under 'Download Options' in the left menu. Select your specific product. Select your language. Click 'Cross operating system (BIOS, Firmware, Diagnostics, etc.)' Click 'Patch' or scroll down to the Patch table j. In the Description column of the Patch table, click the title of the patch: To download the file, click the 'Download' button. To read the release notes, click the 'Release Notes' tab.
HISTORY Version:1 (rev.1) - 9 July 2013 Initial release Version:2 (rev.2) - 17 July 2013 Documented the released patches, added LeftHand NSM2120
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2013 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlHnM80ACgkQ4B86/C0qfVlJvACfYidpkJWgTf29SPsi6ABOpm0y oo0AoNyRilCrIZTF6+a3pOqr4epkrCRX =PHV+ -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0043", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "san\\/iq", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "9.0" }, { "model": "san\\/iq", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "8.5" }, { "model": "san\\/iq", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "8.1" }, { "model": "san\\/iq", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "9.5" }, { "model": "san\\/iq", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "10.0" }, { "model": "san\\/iq", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "8.0" }, { "model": "san\\/iq", "scope": "lte", "trust": 1.0, "vendor": "hp", "version": "10.5" }, { "model": "system x3650", "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": "poweredge 2950", "scope": null, "trust": 0.8, "vendor": "dell", "version": null }, { "model": "hp dl320s", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp p4000 vsa", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp p4300", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp p4300 g2", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp p4500", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp p4500 g2", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp p4900 g2", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp san/iq", "scope": "lte", "trust": 0.8, "vendor": "hewlett packard", "version": "10.5" }, { "model": "hp storevirtual 4130", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp storevirtual 4330", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp storevirtual 4530", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp storevirtual 4630", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp storevirtual 4730", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp storevirtual vsa", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "lefthand nsm2060", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "lefthand nsm2060 g2", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "lefthand nsm2120 g2", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "lefthand vsa", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "san\\/iq", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "10.5" }, { "model": "poweredge", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "29500" } ], "sources": [ { "db": "BID", "id": "61070" }, { "db": "JVNDB", "id": "JVNDB-2013-003323" }, { "db": "CNNVD", "id": "CNNVD-201307-216" }, { "db": "NVD", "id": "CVE-2013-2352" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:ibm:x3650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:dell:poweredge_2950", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:dl320s", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:p4000_vsa", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:p4300", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:p4300_g2", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:p4500", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:p4500_g2", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:p4900_g2", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hp:san%2Fiq", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:storevirtual_4130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:storevirtual_4330", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:storevirtual_4530", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:storevirtual_4630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:storevirtual_4730", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:storevirtual_vsa", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:lefthand_nsm2060", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:lefthand_nsm2060_g2", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:lefthand_nsm2120_g2", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hp:lefthand_vsa", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003323" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joshua Small", "sources": [ { "db": "BID", "id": "61070" } ], "trust": 0.3 }, "cve": "CVE-2013-2352", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2013-2352", "impactScore": 9.2, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-62354", "impactScore": 9.2, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-2352", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-2352", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201307-216", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-62354", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-62354" }, { "db": "JVNDB", "id": "JVNDB-2013-003323" }, { "db": "CNNVD", "id": "CNNVD-201307-216" }, { "db": "NVD", "id": "CVE-2013-2352" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password. HP StoreVirtual products using LeftHand OS are prone to an unauthorized-access vulnerability. \nA remote attacker can exploit this issue to gain unauthorized access to the affected device. This may aid in further attacks. HP StoreVirtual Storage is a set of virtual storage devices supported by LeftHand OS of Hewlett-Packard (HP), which provides functions such as updating data centers, reducing SAN costs and eliminating failure points. LeftHand OS (aka SAN iQ) is an operating system used on this device. The vulnerability is caused by remote attacks. Password to gain the root authority of the user. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03825537\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03825537\nVersion: 2\n\nHPSBST02896 rev.2 - HP StoreVirtual Storage, Remote Unauthorized Access\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2013-07-17\nLast Updated: 2013-07-17\n\nPotential Security Impact: Remote unauthorized access\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with the HP\nStoreVirtual Storage. \n\nAll HP StoreVirtual Storage systems are equipped with a mechanism that allows\nHP support to access the underlying operating system if permission and access\nis provided by the customer. This functionality cannot be disabled today. \n\nHP StoreVirtual products are storage appliances that use a custom operating\nsystem, LeftHand OS, which is not accessible to the end user. Limited access\nis available to the user via the HP StoreVirtual Command-Line Interface\n(CLiQ) however root access is blocked. \n\nRoot access may be requested by HP Support in some cases to help customers\nresolve complex support issues. To facilitate these cases, a\nchallenge-response-based one-time password utility is employed by HP Support\nto gain root access to systems when the customer has granted permission and\nnetwork access to the system. The one-time password utility protects the root\naccess by preventing repeated access to the system with the same pass phrase. \nRoot access to the LeftHand OS does not provide access to the user data being\nstored on the system. \n\nReferences: CVE-2013-2352 (SSRT101257)\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nThis issue effects LeftHand OS (a.k.a. SAN iQ) software versions 10.5 and\nearlier. \n\nHP StoreVirtual device\n\nHP P4300\n\nHP P4500\n\nHP P4300 G2\n\nHP P4500 G2\n\nHP P4800 G2\n\nHP P4900 G2\n\nHP P4000 VSA\n\nHP StoreVirtual 4130\n\nHP StoreVirtual 4330\n\nHP StoreVirtual 4530\n\nHP StoreVirtual 4630\n\nHP StoreVirtual 4730\n\nHP StoreVirtual VSA\n\nLeftHand NSM2060\n\nLeftHand NSM2120\n\nDell PowerEdge 2950\n\nHP DL320S\n\nIBM System x3650\n\nLeftHand NSM2060 G2\n\nLeftHand NSM2120 G2\n\nLeftHand VSA\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2013-2352 (AV:N/AC:L/Au:N/C:N/I:C/A:C) 9.4\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nThe Hewlett-Packard Company thanks Joshua Small for reporting this issue to\nsecurity-alert@hp.com\n\nRESOLUTION\n\nHP has provided patches to resolve this vulnerability. Please see the table\nbelow to determine which patch applies to the StoreVirtual version being\nused. Installation of patch 25051-00 will\nfail if 9.5 Patch Set 05 is not present\n\nNote: HP Support may still request root access to customer systems in order\nto resolve certain support issues. \n\nPatches and release notes may be downloaded using the 9.5 or later CMC. Go to\nhttp://www.hp.com/go/hpsc\n\nSelect your specific product. If you have a HP P4x00 G2\nor HP StoreVirtual 4000 product select \u0027HP StoreVirtual 4000 Storage\u0027. \nSelect \u0027Drivers, Software \u0026 Firmware\u0027 under \u0027Download Options\u0027 in the left\nmenu. \nSelect your specific product. \nSelect your language. Click \u0027Cross operating system (BIOS, Firmware,\nDiagnostics, etc.)\u0027\nClick \u0027Patch\u0027 or scroll down to the Patch table j. In the Description column\nof the Patch table, click the title of the patch:\nTo download the file, click the \u0027Download\u0027 button. \nTo read the release notes, click the \u0027Release Notes\u0027 tab. \n\nHISTORY\nVersion:1 (rev.1) - 9 July 2013 Initial release\nVersion:2 (rev.2) - 17 July 2013 Documented the released patches, added\nLeftHand NSM2120\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2013 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlHnM80ACgkQ4B86/C0qfVlJvACfYidpkJWgTf29SPsi6ABOpm0y\noo0AoNyRilCrIZTF6+a3pOqr4epkrCRX\n=PHV+\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2013-2352" }, { "db": "JVNDB", "id": "JVNDB-2013-003323" }, { "db": "BID", "id": "61070" }, { "db": "VULHUB", "id": "VHN-62354" }, { "db": "PACKETSTORM", "id": "122466" }, { "db": "PACKETSTORM", "id": "122340" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-62354", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-62354" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-2352", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2013-003323", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201307-216", "trust": 0.7 }, { "db": "BID", "id": "61070", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "122466", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "122340", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-62354", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-62354" }, { "db": "BID", "id": "61070" }, { "db": "JVNDB", "id": "JVNDB-2013-003323" }, { "db": "PACKETSTORM", "id": "122466" }, { "db": "PACKETSTORM", "id": "122340" }, { "db": "CNNVD", "id": "CNNVD-201307-216" }, { "db": "NVD", "id": "CVE-2013-2352" } ] }, "id": "VAR-201307-0043", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-62354" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:14:04.629000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBST02896 SSRT101257", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c03825537" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003323" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-62354" }, { "db": "JVNDB", "id": "JVNDB-2013-003323" }, { "db": "NVD", "id": "CVE-2013-2352" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03825537" }, { "trust": 1.7, "url": "http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2352" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2352" }, { "trust": 0.3, "url": "http://www.hp.com" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.2, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2352" }, { "trust": 0.1, "url": "http://www.hp.com/go/hpsc" } ], "sources": [ { "db": "VULHUB", "id": "VHN-62354" }, { "db": "BID", "id": "61070" }, { "db": "JVNDB", "id": "JVNDB-2013-003323" }, { "db": "PACKETSTORM", "id": "122466" }, { "db": "PACKETSTORM", "id": "122340" }, { "db": "CNNVD", "id": "CNNVD-201307-216" }, { "db": "NVD", "id": "CVE-2013-2352" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-62354" }, { "db": "BID", "id": "61070" }, { "db": "JVNDB", "id": "JVNDB-2013-003323" }, { "db": "PACKETSTORM", "id": "122466" }, { "db": "PACKETSTORM", "id": "122340" }, { "db": "CNNVD", "id": "CNNVD-201307-216" }, { "db": "NVD", "id": "CVE-2013-2352" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-07-10T00:00:00", "db": "VULHUB", "id": "VHN-62354" }, { "date": "2013-07-09T00:00:00", "db": "BID", "id": "61070" }, { "date": "2013-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003323" }, { "date": "2013-07-18T18:44:29", "db": "PACKETSTORM", "id": "122466" }, { "date": "2013-07-10T21:48:37", "db": "PACKETSTORM", "id": "122340" }, { "date": "2013-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-216" }, { "date": "2013-07-10T22:55:00.953000", "db": "NVD", "id": "CVE-2013-2352" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-62354" }, { "date": "2013-07-09T00:00:00", "db": "BID", "id": "61070" }, { "date": "2013-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003323" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-216" }, { "date": "2019-10-09T23:07:31.707000", "db": "NVD", "id": "CVE-2013-2352" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-216" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP StoreVirtual Storage Runs on the device LeftHand OS Vulnerabilities that gain management access", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003323" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-216" } ], "trust": 0.6 } }