Lenovo

Thinksystem Sr670 V2 Firmware

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 16.02.2024 17:15:08
  • Zuletzt bearbeitet 23.07.2025 15:15:30

ThinkSystem SR670V2 servers manufactured from approximately June 2021 to July 2023 were left in Manufacturing Mode which could allow an attacker with privileged logical access to the host or physical access to server internals to modify or disable ...

  • EPSS 0.12%
  • Veröffentlicht 25.10.2023 18:17:41
  • Zuletzt bearbeitet 21.11.2024 08:35:31

An authenticated XCC user with Read-Only permission can change a different user’s password through a crafted API command.   This affects ThinkSystem v2 and v3 servers with XCC; ThinkSystem v1 servers are not affected.

  • EPSS 0.13%
  • Veröffentlicht 25.10.2023 18:17:41
  • Zuletzt bearbeitet 21.11.2024 08:35:32

An authenticated XCC user can change permissions for any user through a crafted API command.

  • EPSS 0.1%
  • Veröffentlicht 25.10.2023 18:17:41
  • Zuletzt bearbeitet 21.11.2024 08:35:32

An authenticated XCC user with elevated privileges can perform blind SQL injection in limited cases through a crafted API command.  This affects ThinkSystem v2 and v3 servers with XCC; ThinkSystem v1 servers are not affected.

  • EPSS 0.24%
  • Veröffentlicht 01.05.2023 15:15:09
  • Zuletzt bearbeitet 21.11.2024 07:37:37

A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call.

  • EPSS 0.15%
  • Veröffentlicht 01.05.2023 15:15:09
  • Zuletzt bearbeitet 21.11.2024 07:49:36

A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface or other undefined behavior through a format string injection vulnerability in a web interface API.

  • EPSS 0.15%
  • Veröffentlicht 28.04.2023 22:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:27

A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute ...

  • EPSS 0.11%
  • Veröffentlicht 28.04.2023 22:15:08
  • Zuletzt bearbeitet 21.11.2024 07:49:37

A valid, authenticated administrative user can query a web interface API to reveal the configured LDAP client password used by XCC to authenticate to an external LDAP server in certain configurations. There is no exposure where no LDAP client passwo...

  • EPSS 0.12%
  • Veröffentlicht 28.04.2023 21:15:08
  • Zuletzt bearbeitet 21.11.2024 07:56:28

A valid XCC user's local account permissions overrides their active directory permissions under specific configurations. This could lead to a privilege escalation. To be vulnerable, LDAP must be configured for authentication/authorization and logins ...

  • EPSS 0.06%
  • Veröffentlicht 28.04.2023 21:15:08
  • Zuletzt bearbeitet 21.11.2024 07:56:28

A valid, authenticated XCC user with read-only permissions can modify custom user roles on other user accounts and the user trespass message through the XCC CLI. There is no exposure if SSH is disabled or if there are no users assigned optional read-...