9.8
CVE-2022-28618
- EPSS 3.02%
- Published 20.05.2022 21:15:10
- Last modified 21.11.2024 06:57:35
- Source security-alert@hpe.com
- Teams watchlist Login
- Open Login
A command injection security vulnerability has been identified in HPE Nimble Storage Hybrid Flash Arrays, HPE Nimble Storage All Flash Arrays and HPE Nimble Storage Secondary Flash Arrays that could allow an attacker to execute arbitrary commands on a Nimble appliance. HPE has made the following software updates to resolve the vulnerability in HPE Nimble Storage: 5.0.10.100 or later, 5.2.1.0 or later, 6.0.0.100 or later.
Data is provided by the National Vulnerability Database (NVD)
Hpe ≫ Nimbleos Version < 5.0.10.100
Hpe ≫ Nimble Storage All Flash Arrays Version-
Hpe ≫ Nimble Storage Hybrid Flash Arrays Version-
Hpe ≫ Nimble Storage Secondary Flash Arrays Version-
Hpe ≫ Nimble Storage Hybrid Flash Arrays Version-
Hpe ≫ Nimble Storage Secondary Flash Arrays Version-
Hpe ≫ Nimbleos Version >= 5.1.0.0 < 5.2.1.500
Hpe ≫ Nimble Storage All Flash Arrays Version-
Hpe ≫ Nimble Storage Hybrid Flash Arrays Version-
Hpe ≫ Nimble Storage Secondary Flash Arrays Version-
Hpe ≫ Nimble Storage Hybrid Flash Arrays Version-
Hpe ≫ Nimble Storage Secondary Flash Arrays Version-
Hpe ≫ Nimbleos Version >= 5.3.0.0 < 6.0.0.100
Hpe ≫ Nimble Storage All Flash Arrays Version-
Hpe ≫ Nimble Storage Hybrid Flash Arrays Version-
Hpe ≫ Nimble Storage Secondary Flash Arrays Version-
Hpe ≫ Nimble Storage Hybrid Flash Arrays Version-
Hpe ≫ Nimble Storage Secondary Flash Arrays Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.02% | 0.861 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.