Vulnerabilites related to hp - san\/iq
Vulnerability from fkie_nvd
Published
2012-08-20 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838.
Impacted products
Vendor Product Version
hp san\/iq 9.5
hp virtual_san_appliance -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F03DF-DE17-4BEF-A5F8-CDFB84C42F49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:virtual_san_appliance:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3144C3C6-716E-40E0-90A1-DB2DFB42EEA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838."
    },
    {
      "lang": "es",
      "value": "hydra.exe en HP SAN/iQ anteirores a v9.5 en HP Virtual SAN Appliance tiene una contrase\u00f1a fijada de f\u00e1brica \"L0CAlu53R\" para la cuenta global$agent, lo que permite a atacantes remotos obtener acceso a los servicios de administraci\u00f3n mediante una petici\u00f3n de login sobre el puerto 13838."
    }
  ],
  "id": "CVE-2012-4362",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-20T22:55:01.550",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18893/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18901/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/441363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18893/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18901/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/441363"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
lhn/public/network/ping in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the second parameter.
Impacted products
Vendor Product Version
hp san\/iq *
hp san\/iq 8.0
hp san\/iq 8.1
hp san\/iq 8.5
hp virtual_san_appliance -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2ABA1AF-77E0-4219-9602-260B4B57F71C",
              "versionEndIncluding": "9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D937B3C-053B-41A9-8B9B-D3340CB0D327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2FD5CA-3B53-4A94-8CDF-7CEB67FE393D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38946FF8-2F92-4B6D-98E2-BA88D3868522",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:virtual_san_appliance:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3144C3C6-716E-40E0-90A1-DB2DFB42EEA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "lhn/public/network/ping in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the second parameter."
    },
    {
      "lang": "es",
      "value": "lhn/public/network/ping en HP SAN/iQ anteriores a v9.5 en HP Virtual SAN Appliance \r\npermite a usuarios remotos autenticados a ejecutar comandos a trav\u00e9s de metacaracteres shell en el par\u00e1metro segundo."
    }
  ],
  "id": "CVE-2012-4361",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.7,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 5.1,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-20T22:55:01.503",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18893/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18901/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/441363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18893/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18901/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/441363"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-02-06 12:05
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1513.
Impacted products
Vendor Product Version
hp san\/iq *
hp san\/iq 8.0
hp san\/iq 8.1
hp san\/iq 8.5
hp san\/iq 9.0
hp lefthand_p4000_virtual_san_appliance -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE5757D-B08C-4A26-AFDE-9549B80883E2",
              "versionEndIncluding": "9.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D937B3C-053B-41A9-8B9B-D3340CB0D327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2FD5CA-3B53-4A94-8CDF-7CEB67FE393D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38946FF8-2F92-4B6D-98E2-BA88D3868522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "631B1DBC-0B76-4610-A7A5-5F65D3698672",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:lefthand_p4000_virtual_san_appliance:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E455BA-4724-46F4-B813-61817579A9DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1513."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el HP LeftHand Virtual SAN Appliance hydra con  software anterior a v10.0 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos, tambi\u00e9n conocido como ZDI-CAN-1513."
    }
  ],
  "id": "CVE-2012-3285",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-06T12:05:42.973",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-02-06 12:05
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1468.
Impacted products
Vendor Product Version
hp san\/iq *
hp san\/iq 8.0
hp san\/iq 8.1
hp san\/iq 8.5
hp san\/iq 9.0
hp lefthand_p4000_virtual_san_appliance -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE5757D-B08C-4A26-AFDE-9549B80883E2",
              "versionEndIncluding": "9.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D937B3C-053B-41A9-8B9B-D3340CB0D327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2FD5CA-3B53-4A94-8CDF-7CEB67FE393D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38946FF8-2F92-4B6D-98E2-BA88D3868522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "631B1DBC-0B76-4610-A7A5-5F65D3698672",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:lefthand_p4000_virtual_san_appliance:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E455BA-4724-46F4-B813-61817579A9DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1468."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el HP LeftHand Virtual SAN Appliance hydra con  software anterior a v10.0 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos, tambi\u00e9n conocido como ZDI-CAN-1468."
    }
  ],
  "id": "CVE-2012-3282",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-06T12:05:42.833",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
lhn/public/network/ping in HP SAN/iQ 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) first, (2) third, or (3) fourth parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4361.
Impacted products
Vendor Product Version
hp san\/iq 9.5
hp virtual_san_appliance -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F03DF-DE17-4BEF-A5F8-CDFB84C42F49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:virtual_san_appliance:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3144C3C6-716E-40E0-90A1-DB2DFB42EEA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "lhn/public/network/ping in HP SAN/iQ 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) first, (2) third, or (3) fourth parameter.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4361."
    },
    {
      "lang": "es",
      "value": "lhn/public/network/ping en HP SAN/iQ v9.5 en HP Virtual SAN Appliance permite a usuarios remotos autenticados ejecutar comandos arbitrarios a trav\u00e9s de meta caracteres en una consola en el (1) primer, (2) tercer o (3) cuarto par\u00e1metro. NOTA: esta vulnerabilidad se produce debido una soluci\u00f3n incompleta para la vulnerabilidad CVE-2012-4361."
    }
  ],
  "id": "CVE-2012-2986",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.7,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 5.1,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-20T22:55:00.973",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/441363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/441363"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-02-06 12:05
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1512.
Impacted products
Vendor Product Version
hp san\/iq *
hp san\/iq 8.0
hp san\/iq 8.1
hp san\/iq 8.5
hp san\/iq 9.0
hp lefthand_p4000_virtual_san_appliance -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE5757D-B08C-4A26-AFDE-9549B80883E2",
              "versionEndIncluding": "9.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D937B3C-053B-41A9-8B9B-D3340CB0D327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2FD5CA-3B53-4A94-8CDF-7CEB67FE393D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38946FF8-2F92-4B6D-98E2-BA88D3868522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "631B1DBC-0B76-4610-A7A5-5F65D3698672",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:lefthand_p4000_virtual_san_appliance:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E455BA-4724-46F4-B813-61817579A9DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1512."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el HP LeftHand Virtual SAN Appliance hydra con  software anterior a v10.0 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos, tambi\u00e9n conocido como ZDI-CAN-1512."
    }
  ],
  "id": "CVE-2012-3284",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-06T12:05:42.927",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-02-06 12:05
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1511.
Impacted products
Vendor Product Version
hp san\/iq *
hp san\/iq 8.0
hp san\/iq 8.1
hp san\/iq 8.5
hp san\/iq 9.0
hp lefthand_p4000_virtual_san_appliance -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE5757D-B08C-4A26-AFDE-9549B80883E2",
              "versionEndIncluding": "9.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D937B3C-053B-41A9-8B9B-D3340CB0D327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2FD5CA-3B53-4A94-8CDF-7CEB67FE393D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38946FF8-2F92-4B6D-98E2-BA88D3868522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "631B1DBC-0B76-4610-A7A5-5F65D3698672",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:lefthand_p4000_virtual_san_appliance:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E455BA-4724-46F4-B813-61817579A9DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1511."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el HP LeftHand Virtual SAN Appliance hydra con  software anterior a v10.0 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos, tambi\u00e9n conocido como ZDI-CAN-1511."
    }
  ],
  "id": "CVE-2012-3283",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-06T12:05:42.880",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-11-16 16:55
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in hydra.exe in HP SAN/iQ before 9.5 on the HP StorageWorks P4000 Virtual SAN Appliance allows remote attackers to execute arbitrary code via a crafted login request.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:centralized_management_console_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAB7E26F-6C17-4617-8611-62E0CB1892CA",
              "versionEndIncluding": "9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:centralized_management_console_software:7.0.01:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "DCB98EB0-6E28-47E5-94C1-E706A3533115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:centralized_management_console_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17FEE9D-1EE2-4504-B1FF-B5A1B880C4B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:centralized_management_console_software:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E510FFB-111A-4123-BAD8-5267850E8595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:centralized_management_console_software:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E9CC97D-B0D8-40FC-BA90-9D6EBC705F1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2ABA1AF-77E0-4219-9602-260B4B57F71C",
              "versionEndIncluding": "9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D937B3C-053B-41A9-8B9B-D3340CB0D327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2FD5CA-3B53-4A94-8CDF-7CEB67FE393D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38946FF8-2F92-4B6D-98E2-BA88D3868522",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:storageworks_p4000_virtual_san_appliance:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53D68CDA-12F4-41B1-B833-153B67D6AA00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in hydra.exe in HP SAN/iQ before 9.5 on the HP StorageWorks P4000 Virtual SAN Appliance allows remote attackers to execute arbitrary code via a crafted login request."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en la pila en HP SAN/iQ anteriores a v9.5 en el HP StorageWorks P4000 Virtual SAN Appliance permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una petici\u00f3n de inicio de sesi\u00f3n manipulada."
    }
  ],
  "id": "CVE-2011-4157",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-11-16T16:55:00.753",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.securityfocus.com/bid/47005"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.securityfocus.com/bid/51042"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-111/"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/47005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-111/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71766"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-07-10 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B40F8A-B05A-4A11-8248-268BFD8576CF",
              "versionEndIncluding": "10.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D937B3C-053B-41A9-8B9B-D3340CB0D327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2FD5CA-3B53-4A94-8CDF-7CEB67FE393D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38946FF8-2F92-4B6D-98E2-BA88D3868522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "631B1DBC-0B76-4610-A7A5-5F65D3698672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "203F03DF-DE17-4BEF-A5F8-CDFB84C42F49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:san\\/iq:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0CF6E8-EB82-49B9-B18A-F1FB4039E9DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:dell:poweredge_2950:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ECE7197-361F-465E-B1E0-7320A931F798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:dl320s:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "071D12F8-9CF8-44FF-AFA0-87CA1FD2BAC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:lefthand_nsm2060:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "738A6FF1-41DE-488F-B9B3-3D0CE02E2418",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:lefthand_nsm2060_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27491DE9-3636-4B74-883D-A65FFB6648C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:lefthand_nsm2120_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "454142E2-F96D-49B9-87F6-AEA87ECE7BDE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:lefthand_vsa:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81A5AAE4-5EE0-4D73-807E-B0BF82666EFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:p4000_vsa:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "555DF3BA-ABBA-4118-852F-6ED61CF32914",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:p4300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D77F52-72ED-4683-9C58-88F7B9F25D51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:p4300_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E998752D-888E-40A7-A66B-6F09508D7C51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:p4500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E7E2D2-6650-4EF2-9B31-176E45BAB63D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:p4500_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA8B1909-0EAC-4D78-89BD-E525CEA0A8DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:p4900_g2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "429090AF-D64F-49BD-A0FD-4EADCADBE437",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:storevirtual_4130:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF403618-7CD9-4E9B-A691-5C6C06495FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:storevirtual_4330:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E18B06F5-033A-403F-8C9A-93C686FD0B63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:storevirtual_4530:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50247977-8A95-4E59-B181-055D30A04636",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:storevirtual_4630:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "335C4319-BF69-483E-844E-0F4B201E1987",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:storevirtual_4730:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD5BFA2-FD78-4E0A-A2D6-B64DAD1F68BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:hp:storevirtual_vsa:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AEF436-B249-4C9E-95D9-D784FADFDBFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:ibm:x3650:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C88593-6B6A-4772-AF94-63A78FC93121",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password."
    },
    {
      "lang": "es",
      "value": "LeftHand OS (tambi\u00e9n conocido con SAN iQ) v10.5 y anteriores en dispositivos HP StoreVirtual Storage no proporcionan mecanismos para deshabilitar la caracter\u00edstica de desaf\u00edo-respuesta de root-login en HP Support, haciendo facil para atacantes remotos obtener privilegios administrativos mediante el aprovechamiento de un one-time password (password de una sola vez) no utilizado."
    }
  ],
  "id": "CVE-2013-2352",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-07-10T22:55:00.953",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03825537"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03825537"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03825537"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03825537"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2012-3284 (GCVE-0-2012-3284)
Vulnerability from cvelistv5
Published
2013-02-06 11:00
Modified
2024-09-17 03:08
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1512.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:57:50.507Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBST02846",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
          },
          {
            "name": "SSRT100799",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1512."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-06T11:00:00Z",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "name": "HPSBST02846",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
        },
        {
          "name": "SSRT100799",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2012-3284",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1512."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "HPSBST02846",
              "refsource": "HP",
              "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
            },
            {
              "name": "SSRT100799",
              "refsource": "HP",
              "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2012-3284",
    "datePublished": "2013-02-06T11:00:00Z",
    "dateReserved": "2012-06-06T00:00:00Z",
    "dateUpdated": "2024-09-17T03:08:13.799Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4362 (GCVE-0-2012-4362)
Vulnerability from cvelistv5
Published
2012-08-20 22:00
Modified
2024-09-16 18:33
Severity ?
CWE
  • n/a
Summary
hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838.
References
http://www.exploit-db.com/exploits/18901/exploit, x_refsource_EXPLOIT-DB
http://www.kb.cert.org/vuls/id/441363third-party-advisory, x_refsource_CERT-VN
http://www.exploit-db.com/exploits/18893/exploit, x_refsource_EXPLOIT-DB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:35:08.968Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18901",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/18901/"
          },
          {
            "name": "VU#441363",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/441363"
          },
          {
            "name": "18893",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/18893/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18901",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/18901/"
        },
        {
          "name": "VU#441363",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/441363"
        },
        {
          "name": "18893",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/18893/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-4362",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "hydra.exe in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote attackers to obtain access to a management service via a login: request to TCP port 13838."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18901",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/18901/"
            },
            {
              "name": "VU#441363",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/441363"
            },
            {
              "name": "18893",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/18893/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-4362",
    "datePublished": "2012-08-20T22:00:00Z",
    "dateReserved": "2012-08-20T00:00:00Z",
    "dateUpdated": "2024-09-16T18:33:27.109Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3285 (GCVE-0-2012-3285)
Vulnerability from cvelistv5
Published
2013-02-06 11:00
Modified
2024-09-16 16:48
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1513.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:57:50.427Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBST02846",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
          },
          {
            "name": "SSRT100800",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1513."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-06T11:00:00Z",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "name": "HPSBST02846",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
        },
        {
          "name": "SSRT100800",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2012-3285",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1513."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "HPSBST02846",
              "refsource": "HP",
              "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
            },
            {
              "name": "SSRT100800",
              "refsource": "HP",
              "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2012-3285",
    "datePublished": "2013-02-06T11:00:00Z",
    "dateReserved": "2012-06-06T00:00:00Z",
    "dateUpdated": "2024-09-16T16:48:38.763Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3283 (GCVE-0-2012-3283)
Vulnerability from cvelistv5
Published
2013-02-06 11:00
Modified
2024-09-16 19:00
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1511.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:57:50.410Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SSRT100798",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
          },
          {
            "name": "HPSBST02846",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1511."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-06T11:00:00Z",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "name": "SSRT100798",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
        },
        {
          "name": "HPSBST02846",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2012-3283",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1511."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SSRT100798",
              "refsource": "HP",
              "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
            },
            {
              "name": "HPSBST02846",
              "refsource": "HP",
              "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2012-3283",
    "datePublished": "2013-02-06T11:00:00Z",
    "dateReserved": "2012-06-06T00:00:00Z",
    "dateUpdated": "2024-09-16T19:00:49.709Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4361 (GCVE-0-2012-4361)
Vulnerability from cvelistv5
Published
2012-08-20 22:00
Modified
2024-09-17 01:36
Severity ?
CWE
  • n/a
Summary
lhn/public/network/ping in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the second parameter.
References
http://www.exploit-db.com/exploits/18901/exploit, x_refsource_EXPLOIT-DB
http://www.kb.cert.org/vuls/id/441363third-party-advisory, x_refsource_CERT-VN
http://www.exploit-db.com/exploits/18893/exploit, x_refsource_EXPLOIT-DB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:35:09.491Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18901",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/18901/"
          },
          {
            "name": "VU#441363",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/441363"
          },
          {
            "name": "18893",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/18893/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "lhn/public/network/ping in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the second parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18901",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/18901/"
        },
        {
          "name": "VU#441363",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/441363"
        },
        {
          "name": "18893",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/18893/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-4361",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "lhn/public/network/ping in HP SAN/iQ before 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the second parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18901",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/18901/"
            },
            {
              "name": "VU#441363",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/441363"
            },
            {
              "name": "18893",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/18893/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-4361",
    "datePublished": "2012-08-20T22:00:00Z",
    "dateReserved": "2012-08-20T00:00:00Z",
    "dateUpdated": "2024-09-17T01:36:37.353Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2352 (GCVE-0-2013-2352)
Vulnerability from cvelistv5
Published
2013-07-10 22:00
Modified
2024-09-16 16:37
Severity ?
CWE
  • n/a
Summary
LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:36:46.179Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SSRT101257",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03825537"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/"
          },
          {
            "name": "HPSBST02896",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03825537"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-07-10T22:00:00Z",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "name": "SSRT101257",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03825537"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/"
        },
        {
          "name": "HPSBST02896",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03825537"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2013-2352",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SSRT101257",
              "refsource": "HP",
              "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03825537"
            },
            {
              "name": "http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/",
              "refsource": "MISC",
              "url": "http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/"
            },
            {
              "name": "HPSBST02896",
              "refsource": "HP",
              "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03825537"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2013-2352",
    "datePublished": "2013-07-10T22:00:00Z",
    "dateReserved": "2013-03-04T00:00:00Z",
    "dateUpdated": "2024-09-16T16:37:31.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4157 (GCVE-0-2011-4157)
Vulnerability from cvelistv5
Published
2011-11-16 16:00
Modified
2024-08-07 00:01
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in hydra.exe in HP SAN/iQ before 9.5 on the HP StorageWorks P4000 Virtual SAN Appliance allows remote attackers to execute arbitrary code via a crafted login request.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:51.086Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-111/"
          },
          {
            "name": "47005",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47005"
          },
          {
            "name": "51042",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51042"
          },
          {
            "name": "SSRT100279",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086"
          },
          {
            "name": "HPSBST02722",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086"
          },
          {
            "name": "hp-storageworks-unspec-command-exec(71766)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71766"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in hydra.exe in HP SAN/iQ before 9.5 on the HP StorageWorks P4000 Virtual SAN Appliance allows remote attackers to execute arbitrary code via a crafted login request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-111/"
        },
        {
          "name": "47005",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47005"
        },
        {
          "name": "51042",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51042"
        },
        {
          "name": "SSRT100279",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086"
        },
        {
          "name": "HPSBST02722",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086"
        },
        {
          "name": "hp-storageworks-unspec-command-exec(71766)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71766"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2011-4157",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in hydra.exe in HP SAN/iQ before 9.5 on the HP StorageWorks P4000 Virtual SAN Appliance allows remote attackers to execute arbitrary code via a crafted login request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-111/",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-111/"
            },
            {
              "name": "47005",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47005"
            },
            {
              "name": "51042",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51042"
            },
            {
              "name": "SSRT100279",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086"
            },
            {
              "name": "HPSBST02722",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086"
            },
            {
              "name": "hp-storageworks-unspec-command-exec(71766)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71766"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2011-4157",
    "datePublished": "2011-11-16T16:00:00",
    "dateReserved": "2011-10-21T00:00:00",
    "dateUpdated": "2024-08-07T00:01:51.086Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2986 (GCVE-0-2012-2986)
Vulnerability from cvelistv5
Published
2012-08-20 22:00
Modified
2024-09-16 19:47
Severity ?
CWE
  • n/a
Summary
lhn/public/network/ping in HP SAN/iQ 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) first, (2) third, or (3) fourth parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4361.
References
http://www.kb.cert.org/vuls/id/441363third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.422Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#441363",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/441363"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "lhn/public/network/ping in HP SAN/iQ 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) first, (2) third, or (3) fourth parameter.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4361."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-20T22:00:00Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#441363",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/441363"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2012-2986",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "lhn/public/network/ping in HP SAN/iQ 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) first, (2) third, or (3) fourth parameter.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4361."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#441363",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/441363"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2012-2986",
    "datePublished": "2012-08-20T22:00:00Z",
    "dateReserved": "2012-05-30T00:00:00Z",
    "dateUpdated": "2024-09-16T19:47:19.572Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3282 (GCVE-0-2012-3282)
Vulnerability from cvelistv5
Published
2013-02-06 11:00
Modified
2024-09-16 18:45
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1468.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:57:50.448Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SSRT100722",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
          },
          {
            "name": "HPSBST02846",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1468."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-06T11:00:00Z",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "name": "SSRT100722",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
        },
        {
          "name": "HPSBST02846",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2012-3282",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1468."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SSRT100722",
              "refsource": "HP",
              "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
            },
            {
              "name": "HPSBST02846",
              "refsource": "HP",
              "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03661318"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2012-3282",
    "datePublished": "2013-02-06T11:00:00Z",
    "dateReserved": "2012-06-06T00:00:00Z",
    "dateUpdated": "2024-09-16T18:45:10.844Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-201307-0043
Vulnerability from variot

LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password. HP StoreVirtual products using LeftHand OS are prone to an unauthorized-access vulnerability. A remote attacker can exploit this issue to gain unauthorized access to the affected device. This may aid in further attacks. HP StoreVirtual Storage is a set of virtual storage devices supported by LeftHand OS of Hewlett-Packard (HP), which provides functions such as updating data centers, reducing SAN costs and eliminating failure points. LeftHand OS (aka SAN iQ) is an operating system used on this device. The vulnerability is caused by remote attacks. Password to gain the root authority of the user. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03825537

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03825537 Version: 2

HPSBST02896 rev.2 - HP StoreVirtual Storage, Remote Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2013-07-17 Last Updated: 2013-07-17

Potential Security Impact: Remote unauthorized access

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY A potential security vulnerability has been identified with the HP StoreVirtual Storage.

All HP StoreVirtual Storage systems are equipped with a mechanism that allows HP support to access the underlying operating system if permission and access is provided by the customer. This functionality cannot be disabled today.

HP StoreVirtual products are storage appliances that use a custom operating system, LeftHand OS, which is not accessible to the end user. Limited access is available to the user via the HP StoreVirtual Command-Line Interface (CLiQ) however root access is blocked.

Root access may be requested by HP Support in some cases to help customers resolve complex support issues. To facilitate these cases, a challenge-response-based one-time password utility is employed by HP Support to gain root access to systems when the customer has granted permission and network access to the system. The one-time password utility protects the root access by preventing repeated access to the system with the same pass phrase. Root access to the LeftHand OS does not provide access to the user data being stored on the system.

References: CVE-2013-2352 (SSRT101257)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. This issue effects LeftHand OS (a.k.a. SAN iQ) software versions 10.5 and earlier.

HP StoreVirtual device

HP P4300

HP P4500

HP P4300 G2

HP P4500 G2

HP P4800 G2

HP P4900 G2

HP P4000 VSA

HP StoreVirtual 4130

HP StoreVirtual 4330

HP StoreVirtual 4530

HP StoreVirtual 4630

HP StoreVirtual 4730

HP StoreVirtual VSA

LeftHand NSM2060

LeftHand NSM2120

Dell PowerEdge 2950

HP DL320S

IBM System x3650

LeftHand NSM2060 G2

LeftHand NSM2120 G2

LeftHand VSA

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2013-2352 (AV:N/AC:L/Au:N/C:N/I:C/A:C) 9.4 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

The Hewlett-Packard Company thanks Joshua Small for reporting this issue to security-alert@hp.com

RESOLUTION

HP has provided patches to resolve this vulnerability. Please see the table below to determine which patch applies to the StoreVirtual version being used. Installation of patch 25051-00 will fail if 9.5 Patch Set 05 is not present

Note: HP Support may still request root access to customer systems in order to resolve certain support issues.

Patches and release notes may be downloaded using the 9.5 or later CMC. Go to http://www.hp.com/go/hpsc

Select your specific product. If you have a HP P4x00 G2 or HP StoreVirtual 4000 product select 'HP StoreVirtual 4000 Storage'. Select 'Drivers, Software & Firmware' under 'Download Options' in the left menu. Select your specific product. Select your language. Click 'Cross operating system (BIOS, Firmware, Diagnostics, etc.)' Click 'Patch' or scroll down to the Patch table j. In the Description column of the Patch table, click the title of the patch: To download the file, click the 'Download' button. To read the release notes, click the 'Release Notes' tab.

HISTORY Version:1 (rev.1) - 9 July 2013 Initial release Version:2 (rev.2) - 17 July 2013 Documented the released patches, added LeftHand NSM2120

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2013 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)

iEYEARECAAYFAlHnM80ACgkQ4B86/C0qfVlJvACfYidpkJWgTf29SPsi6ABOpm0y oo0AoNyRilCrIZTF6+a3pOqr4epkrCRX =PHV+ -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0043",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "san\\/iq",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "9.0"
      },
      {
        "model": "san\\/iq",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "8.5"
      },
      {
        "model": "san\\/iq",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "san\\/iq",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "9.5"
      },
      {
        "model": "san\\/iq",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "10.0"
      },
      {
        "model": "san\\/iq",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "8.0"
      },
      {
        "model": "san\\/iq",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.5"
      },
      {
        "model": "system x3650",
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "poweredge 2950",
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "model": "hp dl320s",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp p4000 vsa",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp p4300",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp p4300 g2",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp p4500",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp p4500 g2",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp p4900 g2",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp san/iq",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.5"
      },
      {
        "model": "hp storevirtual 4130",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp storevirtual 4330",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp storevirtual 4530",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp storevirtual 4630",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp storevirtual 4730",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "hp storevirtual vsa",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "lefthand nsm2060",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "lefthand nsm2060 g2",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "lefthand nsm2120 g2",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "lefthand vsa",
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "san\\/iq",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "10.5"
      },
      {
        "model": "poweredge",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "29500"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "61070"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2352"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:ibm:x3650",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:dell:poweredge_2950",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:dl320s",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:p4000_vsa",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:p4300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:p4300_g2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:p4500",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:p4500_g2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:p4900_g2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:hp:san%2Fiq",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:storevirtual_4130",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:storevirtual_4330",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:storevirtual_4530",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:storevirtual_4630",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:storevirtual_4730",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:storevirtual_vsa",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:lefthand_nsm2060",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:lefthand_nsm2060_g2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:lefthand_nsm2120_g2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:hp:lefthand_vsa",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Joshua Small",
    "sources": [
      {
        "db": "BID",
        "id": "61070"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-2352",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2013-2352",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-62354",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-2352",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-2352",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201307-216",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-62354",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62354"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2352"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password. HP StoreVirtual products using LeftHand OS are prone to an unauthorized-access vulnerability. \nA remote attacker can exploit this issue to gain unauthorized access to  the affected device. This may aid in further attacks. HP StoreVirtual Storage is a set of virtual storage devices supported by LeftHand OS of Hewlett-Packard (HP), which provides functions such as updating data centers, reducing SAN costs and eliminating failure points. LeftHand OS (aka SAN iQ) is an operating system used on this device. The vulnerability is caused by remote attacks. Password to gain the root authority of the user. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03825537\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03825537\nVersion: 2\n\nHPSBST02896 rev.2 - HP StoreVirtual Storage, Remote Unauthorized Access\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2013-07-17\nLast Updated: 2013-07-17\n\nPotential Security Impact: Remote unauthorized access\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with the HP\nStoreVirtual Storage. \n\nAll HP StoreVirtual Storage systems are equipped with a mechanism that allows\nHP support to access the underlying operating system if permission and access\nis provided by the customer. This functionality cannot be disabled today. \n\nHP StoreVirtual products are storage appliances that use a custom operating\nsystem, LeftHand OS, which is not accessible to the end user. Limited access\nis available to the user via the HP StoreVirtual Command-Line Interface\n(CLiQ) however root access is blocked. \n\nRoot access may be requested by HP Support in some cases to help customers\nresolve complex support issues. To facilitate these cases, a\nchallenge-response-based one-time password utility is employed by HP Support\nto gain root access to systems when the customer has granted permission and\nnetwork access to the system. The one-time password utility protects the root\naccess by preventing repeated access to the system with the same pass phrase. \nRoot access to the LeftHand OS does not provide access to the user data being\nstored on the system. \n\nReferences: CVE-2013-2352 (SSRT101257)\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nThis issue effects LeftHand OS (a.k.a. SAN iQ) software versions 10.5 and\nearlier. \n\nHP StoreVirtual device\n\nHP P4300\n\nHP P4500\n\nHP P4300 G2\n\nHP P4500 G2\n\nHP P4800 G2\n\nHP P4900 G2\n\nHP P4000 VSA\n\nHP StoreVirtual 4130\n\nHP StoreVirtual 4330\n\nHP StoreVirtual 4530\n\nHP StoreVirtual 4630\n\nHP StoreVirtual 4730\n\nHP StoreVirtual VSA\n\nLeftHand NSM2060\n\nLeftHand NSM2120\n\nDell PowerEdge 2950\n\nHP DL320S\n\nIBM System x3650\n\nLeftHand NSM2060 G2\n\nLeftHand NSM2120 G2\n\nLeftHand VSA\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2013-2352    (AV:N/AC:L/Au:N/C:N/I:C/A:C)       9.4\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nThe Hewlett-Packard Company thanks Joshua Small for reporting this issue to\nsecurity-alert@hp.com\n\nRESOLUTION\n\nHP has provided patches to resolve this vulnerability. Please see the table\nbelow to determine which patch applies to the StoreVirtual version being\nused. Installation of patch 25051-00 will\nfail if 9.5 Patch Set 05 is not present\n\nNote: HP Support may still request root access to customer systems in order\nto resolve certain support issues. \n\nPatches and release notes may be downloaded using the 9.5 or later CMC. Go to\nhttp://www.hp.com/go/hpsc\n\nSelect your specific product. If you have a HP P4x00 G2\nor HP StoreVirtual 4000 product select \u0027HP StoreVirtual 4000 Storage\u0027. \nSelect \u0027Drivers, Software \u0026 Firmware\u0027 under \u0027Download Options\u0027 in the left\nmenu. \nSelect your specific product. \nSelect your language. Click \u0027Cross operating system (BIOS, Firmware,\nDiagnostics, etc.)\u0027\nClick \u0027Patch\u0027 or scroll down to the Patch table j. In the Description column\nof the Patch table, click the title of the patch:\nTo download the file, click the \u0027Download\u0027 button. \nTo read the release notes, click the \u0027Release Notes\u0027 tab. \n\nHISTORY\nVersion:1 (rev.1) - 9 July 2013 Initial release\nVersion:2 (rev.2) - 17 July 2013 Documented the released patches, added\nLeftHand NSM2120\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2013 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlHnM80ACgkQ4B86/C0qfVlJvACfYidpkJWgTf29SPsi6ABOpm0y\noo0AoNyRilCrIZTF6+a3pOqr4epkrCRX\n=PHV+\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-2352"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      },
      {
        "db": "BID",
        "id": "61070"
      },
      {
        "db": "VULHUB",
        "id": "VHN-62354"
      },
      {
        "db": "PACKETSTORM",
        "id": "122466"
      },
      {
        "db": "PACKETSTORM",
        "id": "122340"
      }
    ],
    "trust": 2.16
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-62354",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62354"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-2352",
        "trust": 3.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-216",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "61070",
        "trust": 0.4
      },
      {
        "db": "PACKETSTORM",
        "id": "122466",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "122340",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-62354",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62354"
      },
      {
        "db": "BID",
        "id": "61070"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      },
      {
        "db": "PACKETSTORM",
        "id": "122466"
      },
      {
        "db": "PACKETSTORM",
        "id": "122340"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2352"
      }
    ]
  },
  "id": "VAR-201307-0043",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62354"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T15:14:04.629000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBST02896 SSRT101257",
        "trust": 0.8,
        "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c03825537"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62354"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2352"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03825537"
      },
      {
        "trust": 1.7,
        "url": "http://www.theregister.co.uk/2013/07/09/hp_storage_more_possible_backdoors/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2352"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2352"
      },
      {
        "trust": 0.3,
        "url": "http://www.hp.com"
      },
      {
        "trust": 0.2,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/"
      },
      {
        "trust": 0.2,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
      },
      {
        "trust": 0.2,
        "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2352"
      },
      {
        "trust": 0.1,
        "url": "http://www.hp.com/go/hpsc"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-62354"
      },
      {
        "db": "BID",
        "id": "61070"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      },
      {
        "db": "PACKETSTORM",
        "id": "122466"
      },
      {
        "db": "PACKETSTORM",
        "id": "122340"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2352"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-62354"
      },
      {
        "db": "BID",
        "id": "61070"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      },
      {
        "db": "PACKETSTORM",
        "id": "122466"
      },
      {
        "db": "PACKETSTORM",
        "id": "122340"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-2352"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-07-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-62354"
      },
      {
        "date": "2013-07-09T00:00:00",
        "db": "BID",
        "id": "61070"
      },
      {
        "date": "2013-07-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      },
      {
        "date": "2013-07-18T18:44:29",
        "db": "PACKETSTORM",
        "id": "122466"
      },
      {
        "date": "2013-07-10T21:48:37",
        "db": "PACKETSTORM",
        "id": "122340"
      },
      {
        "date": "2013-07-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201307-216"
      },
      {
        "date": "2013-07-10T22:55:00.953000",
        "db": "NVD",
        "id": "CVE-2013-2352"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-62354"
      },
      {
        "date": "2013-07-09T00:00:00",
        "db": "BID",
        "id": "61070"
      },
      {
        "date": "2013-07-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201307-216"
      },
      {
        "date": "2019-10-09T23:07:31.707000",
        "db": "NVD",
        "id": "CVE-2013-2352"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-216"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "HP StoreVirtual Storage Runs on the device  LeftHand OS Vulnerabilities that gain management access",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003323"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-216"
      }
    ],
    "trust": 0.6
  }
}