9.8

CVE-2019-11994

A security vulnerability has been identified in HPE SimpliVity 380 Gen 9, HPE SimpliVity 380 Gen 10, HPE SimpliVity 380 Gen 10 G, HPE SimpliVity 2600 Gen 10, SimpliVity OmniCube, SimpliVity OmniStack for Cisco, SimpliVity OmniStack for Lenovo and SimpliVity OmniStack for Dell nodes. An API is used to execute a command manifest file during upgrade does not correctly prevent directory traversal and so can be used to execute manifest files in arbitrary locations on the node. The API does not require user authentication and is accessible over the management network, resulting in the potential for unauthenticated remote execution of manifest files. For all customers running HPE OmniStack version 3.7.9 and earlier. HPE recommends upgrading the OmniStack software to version 3.7.10 or later, which contains a permanent resolution. Customers and partners who can upgrade to 3.7.10 should upgrade at the earliest convenience. For all customers and partners unable to upgrade their environments to the recommended version 3.7.10, HPE has created a Temporary Workaround https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=mmr_sf-EN_US000061901&withFrame for you to implement. All customer should upgrade to the recommended 3.7.10 or later version at the earliest convenience.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
HpSimplivity 380 Gen9 Firmware Version >= 3.6.2 <= 3.7.9
   HpSimplivity 380 Gen9 Version-
HpSimplivity 380 Gen10 G Firmware Version >= 3.7.8 <= 3.7.9
   HpSimplivity 380 Gen10 G Version-
HpSimplivity 380 Gen10 Firmware Version >= 3.7.1 <= 3.7.9
   HpSimplivity 380 Gen10 Version-
HpSimplivity 2600 Gen10 Firmware Version >= 3.7.5 <= 3.7.9
   HpSimplivity 2600 Gen10 Version-
HpSimplivity Omnicube Firmware Version >= 3.5.2 <= 3.7.9
   HpSimplivity Omnicube Version-
HpSimplivity Omnistack For Dell Firmware Version >= 3.5.2 <= 3.7.9
   HpSimplivity Omnistack For Dell Version-
HpSimplivity Omnistack For Cisco Firmware Version >= 3.5.2 <= 3.7.9
HpSimplivity Omnistack For Lenovo Firmware Version >= 3.5.2 <= 3.7.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 4.31% 0.882
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.