CVE-2015-5434 (GCVE-0-2015-5434)

Vulnerability from cvelistv5 – Published: 2016-01-05 11:00 – Updated: 2024-08-06 06:50
VLAI?
Summary
HPE Networking Products, originally branded as Comware 5, Comware 7, H3C, or HP, allow remote attackers to bypass intended access restrictions or cause a denial of service via "Virtual routing and forwarding (VRF) hopping."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
hp
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:50:01.997Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04779492"
          },
          {
            "name": "79869",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/79869"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-12-18T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "HPE Networking Products, originally branded as Comware 5, Comware 7, H3C, or HP, allow remote attackers to bypass intended access restrictions or cause a denial of service via \"Virtual routing and forwarding (VRF) hopping.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-29T21:57:01.000Z",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04779492"
        },
        {
          "name": "79869",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/79869"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2015-5434",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "HPE Networking Products, originally branded as Comware 5, Comware 7, H3C, or HP, allow remote attackers to bypass intended access restrictions or cause a denial of service via \"Virtual routing and forwarding (VRF) hopping.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04779492",
              "refsource": "CONFIRM",
              "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04779492"
            },
            {
              "name": "79869",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/79869"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2015-5434",
    "datePublished": "2016-01-05T11:00:00.000Z",
    "dateReserved": "2015-07-07T00:00:00.000Z",
    "dateUpdated": "2024-08-06T06:50:01.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2015-5434\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2016-01-05T11:59:00.097\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HPE Networking Products, originally branded as Comware 5, Comware 7, H3C, or HP, allow remote attackers to bypass intended access restrictions or cause a denial of service via \\\"Virtual routing and forwarding (VRF) hopping.\\\"\"},{\"lang\":\"es\",\"value\":\"HPE Networking Products, marcados originalmente como Comware 5, Comware 7, H3C o HP, permiten a atacantes remotos eludir las restricciones destinadas al acceso o provocar una denegaci\u00f3n de servicio a trav\u00e9s de \\\"Virtual routing and forwarding (VRF) hopping.\\\"\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:jg786a_hp_flexfabric_12500_4-port_100gbe_cfp_fd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8029344-CBE9-453D-A36C-9594022CF023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:jg787a_hp_flexfabric_12500_4-port_100gbe_cfp_fd_taa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E13BAE93-038A-4E1F-AA32-5C8BEE92FBA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:jg788a_hp_flexfabric_12500_4-port_100gbe_cfp_fg:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C58EAB-881F-4AF7-9966-ACDC4BF2B8DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:jg789a_hp_flexfabric_12500_4-port_100gbe_cfp_fg_taa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6427C66-4C95-4516-ADEF-AAA1F22A08BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:jg798a_hp_flexfabric_12508e_fabric:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B112895E-4929-45F1-8F36-B70D447B690C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:jg810aae_hp_vsr1001_virtual_services_router_60_day_evaluation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C92DE1-66AE-4301-B6D5-C0D5A4CDF76A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:jh192a_hp_10500_48-port_gig-t_\\\\(rj45\\\\)_se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4515D563-7FAA-4941-AF3A-D20A2E47DA89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:jh196a_hp_10500_2-port_100gbe_cfp_ec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C931D7C0-121B-4C2B-A8E1-BD27D524E16E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc072b_hp_12500_main_processing_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA08A75E-8BBD-4CFD-BE31-5BEACB22E9C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc085a_hp_a12518_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F428EBEA-CCED-4831-A9B6-2E4DFDA9BAAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc086a_hp_a12508_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFA4BB4-BFC3-4B74-A056-BE5D4FDF3C75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc124a_hp_a9508_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB483C2-36ED-4980-86A4-37982714DC7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc124b_hp_9505_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4F46A3A-974F-4D2B-80D9-D6F9B8471F1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc125a_hp_a9512_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C6592C-6DC0-4B9F-BABB-6BEA3BBF75B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc125b_hp_9512_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52DC3B4-FBCE-4C3A-979A-12A02B151B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc474a_hp_a9508-v_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D66C9E-1007-4606-A9B1-D73012A633D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc474b_hp_9508-v_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D3111AD-8AE7-479F-B3FE-75039297FE17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc611a_hp_10508-v_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"909AD4CB-B8D4-4540-94FB-E126874D0B29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc612a_hp_10508_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF104CE-BFE7-4596-9D43-44CAB6CD86B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc613a_hp_10504_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32C401CF-5F0A-42D5-B64F-6AEC05F60539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc652a_hp_12508_dc_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA55B492-2F43-4331-8521-7A5870066BDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc653a_hp_12518_dc_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E4FA85-949D-461E-B3E1-66B769F16A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc654a_hp_12504_ac_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4B60A9-4CBD-4F35-AD09-7857FF08B444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc655a_hp_12504_dc_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1C85E1F-68A2-482E-8ECD-C2E9351D8F35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc748a_hp_10512_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A88116C-9FFB-4C01-99F1-C43F59F8E31C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jc808a_hp_12500_taa_main_processing_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13B7D4CB-2E47-4081-97E0-BC48CC5416C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jf430a_hp_a12518_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5152585-519F-46A0-8A37-339B97637BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jf430b_hp_12518_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C687AAF0-8B65-45F7-B9B0-4796DB7003EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jf430c_hp_12518_ac_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E281C457-D768-4EAC-8068-2597E5FD046C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jf431a_hp_a12508_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D2E8B50-D4F4-49B0-B98E-03634A3F8F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jf431b_hp_12508_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25878F0B-FFB5-41D9-B411-B13C68294B99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jf431c_hp_12508_ac_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED6E1B19-DF0B-4274-8D9B-EE72E9429E61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg296a_hp_5920af-24xg_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8491974-092E-4BA0-A7EA-3233B497CE7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg353a_hp_hsr6602-g_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B471E31D-979A-4C01-89A0-0F40F85B0C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg354a_hp_hsr6602-xg_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA07786E-DC6A-4CDC-97B5-A39269AD219B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg361a_hp_hsr6802_router_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82F07E4A-723F-4A1B-8DA1-2EE41A148166\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg361b_hp_hsr6802_router_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF051371-8E16-429D-9388-5B55B8813EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg362a_hp_hsr6804_router_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"169C3DDD-FC34-4C7C-B634-B0FEDDF55BC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg362b_hp_hsr6804_router_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7DD4EA5-9E85-4EBC-858E-972A1C6DB681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg363a_hp_hsr6808_router_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1B82000-E1AB-482E-B293-F958D97B0287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg363b_hp_hsr6808_router_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90DC9D16-C936-4731-B280-B58D1FEE581A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg364a_hp_hsr6800_rse-x2_router_main_processing_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A893789-7EF7-46D9-9ACD-E570835EF226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg402a_hp_msr4080_router_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91702C4C-381C-483F-BAC4-908C2657B3F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg403a_hp_msr4060_router_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C15E6B9D-A9F8-44C3-A678-43B2AB7843A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg404a_hp_msr3064_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3ACB7DA-A4E8-4208-9233-11371EF442D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg405a_hp_msr3044_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F57234-408E-47FF-9D2B-9B64BC24EDB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg406a_hp_msr3024_ac_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF2563D-DC99-479A-935F-61F843B0E90F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg407a_hp_msr3024_dc_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D80BA740-ECFE-4704-9F33-7C830F0AD018\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg408a_hp_msr3024_poe_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0A09E89-EEC0-4DC0-8A91-3B948BEDB3AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg409a_hp_msr3012_ac_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C62614D9-2419-4592-A17F-C9749D57933D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg410a_hp_msr3012_dc_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93479EF-2C34-40BC-A6F6-8F9E08ABA59A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg411a_hp_msr2003_ac_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D15E2A80-4C8A-4711-B35C-81C912896846\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg412a_hp_msr4000_mpu-100_main_processing_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9274EF52-15B6-42D5-831C-5DC22D97C272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg555a_hp_5920af-24xg_taa_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06D004C5-3D0B-4EF4-B662-ABA2A86FFECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg734a_hp_msr2004-24_ac_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CF7F7C1-F220-4ABA-A8E1-0D56CB004346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg735a\\\\)_hp_msr2004-48_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95F610E-992A-4C33-A7B9-0A7383F551D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg776a_hp_hsr6602-g_taa-compliant_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DB0144C-FB35-41E5-8C77-AD98818CE6FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg777a_hp_hsr6602-xg_taa-compliant_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97BF4524-45E6-473F-95A1-A49742B2013F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg779a_hp_hsr6800_rse-x2_router_taa-compliant_main_processing_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49C864B5-AC90-4E9A-B4BB-C46BFC3681B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg782a_hp_ff_12508e_ac_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"796AA9F1-4723-4498-A44C-EC619DA293C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg783a_hp_ff_12508e_dc_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F107E1-1F22-4BE3-89D3-C4CC18BFE4CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg784a_hp_ff_12518e_ac_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37E616D0-0976-45D2-838F-7F95537566F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg785a_hp_ff_12518e_dc_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8ECEF7A-EBC8-4608-BEC2-2E92217FCCE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg802a_hp_ff_12500e_mpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BF87011-9AE9-4773-98B8-3E1F3BEC9A6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg803a_hp_flexfabric_12500e_taa-compliant_main_processing_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4378114E-BE63-4324-B5A5-EF0DBC564E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg811aae_hp_vsr1001_comware_7_virtual_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC6F3044-CB6E-4A15-9712-2DDA467C9BC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg812aae_hp_vsr1004_comware_7_virtual_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7717EE03-8B9C-4BF0-97FE-E2F3A06D97DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg813aae_hp_vsr1008_comware_7_virtual_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7895746-23F5-44AD-95E9-1FEB39A3AF94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg820a_hp_10504_taa_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D40501D7-38A3-4E24-B0A9-3582338A9910\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg821a_hp_10508_taa_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72141441-3776-40D5-BAAD-28FFA446597A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg822a_hp_10508-v_taa_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99800C51-E94E-478D-9A92-CAA8AEB66533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg823a_hp_10512_taa_switch_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0350F5D5-9A06-4E04-AAAC-DA68A0741628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg834a_hp_flexfabric_12508e_ac_switch_taa-compliant_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5580505-DE9E-4153-A9AE-5331130E7290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg835a_hp_flexfabric_12508e_dc_switch_taa-compliant_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F437CA0-3422-4E3B-B52E-9132BC5A62ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg836a_hp_flexfabric_12518e_ac_switch_taa-compliant_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9EC287E-271A-456D-9011-E850DFF560B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg837a_hp_flexfabric_12518e_dc_switch_taa-compliant_chassis:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA49730-3381-404A-98A9-DADF1E264465\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg861a_hp_msr3024_taa-compliant_ac_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E6EADF-02F5-4B75-819C-5118ED31D350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg866a_hp_msr2003_taa-compliant_ac_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F804217-A157-4B30-826D-4BD0964ECD2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg869a_hp_msr4000_taa-compliant_mpu-100_main_processing_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B41A1FFA-595C-4C36-AA6E-F4738AFC429E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jg875a_hp_msr1002-4_ac_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F664253-1037-4653-86C4-B412F395EECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jh060a_hp_msr1003-8s_ac_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74FA5662-09DD-4202-9EFB-DD2C7DF04C97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jh075a\\\\)_hp_hsr6800_rse-x3_router_main_processing_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04DD673A-B58C-4F7F-8DA4-635E7D2153C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jh179a_hp_flexfabric_5930_4-slot_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A77B341-D052-42CF-AFA6-99CF441132CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:jh188a_hp_flexfabric_5930_4-slot_taa-compliant_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1902BB32-A641-422B-B636-1B97653D712C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:jg496a_hp_10500_type_a_mpu_with_comware:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE57887D-E3C0-42C1-AAF6-E6835F888D78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:jg497a_hp_12500_mpu_w\\\\/comware:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56E53E2C-C729-40A3-A6B0-58AF60213C43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:jh198a_hp_10500_type_d_main_processing_unit_with_comware:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2827AB5-1C77-4E24-A4F3-73DB1A0F7537\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/79869\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04779492\",\"source\":\"hp-security-alert@hp.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/79869\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04779492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…