FKIE_CVE-2013-4840

Vulnerability from fkie_nvd - Published: 2014-07-28 17:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:h3c:secbladefw:5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD12127-958E-428E-83A7-CFC571798791",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:h3c:secpath1000fe:5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AFCC50-27E4-438C-9C04-78D5C44BC825",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:h3c:f1000-e_vpn_firewall:0235a26g:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EACFEAB-82BC-4193-8EAC-F59D2F028706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:h3c:s5820_secblade_vpn_firewall_module:0231a94j:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B6AA2D-BE4A-4380-82D6-B7E9D549E15B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:h3c:s7500e_secblade_vpn_firewall_module:0231a832:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC847B9B-080B-4F7E-BFF6-DE2E37F11783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:h3c:s9500e_secblade_vpn_firewall_module:0231a0av:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E411D72-F41D-4D44-81AB-4C07A8FE9508",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:h3c:sr66_gigabit_firewall_module:0231a88a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA2C79B-277C-4248-8EBE-4DDC1E68FFD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:h3c:sr88_firewall_processing_module:0231a88l:*:*:*:*:*:*:*",
              "matchCriteriaId": "107AA4CD-C6A0-491E-8AEF-A8351F5817A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:secbladefw:5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D904D558-F2A1-481E-8385-DB0725D0F39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:secpath1000fe:5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2BA2777-B883-451C-AF6A-DF644EDFB180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:10500\\/7500_advanced_vpn_firewall_module:jd249a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7ACA705-1A73-4B85-858E-CAD60C1A8B2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:12500_vpn_firewall_module:jc635a:*:*:*:*:*:*:*",
              "matchCriteriaId": "75DBDC67-9EF2-4378-A9A4-931F533A86A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:5820_vpn_firewall_module:jd255a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0779333D-A830-4806-80A7-D26CC3EF4505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:6600_firewall_processing_rtr_module:jd250a:*:*:*:*:*:*:*",
              "matchCriteriaId": "47492362-5B20-458D-BAF9-77694C305E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:8800_firewall_processing_module:jd251a:*:*:*:*:*:*:*",
              "matchCriteriaId": "044F78E3-2F84-4620-95B4-86ACB4FDC18C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:9500_vpn_firewall_module:jd245a:*:*:*:*:*:*:*",
              "matchCriteriaId": "47981D1E-0212-4E89-BF8E-67DCDFE27F1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:s1000-e_vpn_firewall_appliance:jd272a:*:*:*:*:*:*:*",
              "matchCriteriaId": "99D1883B-029F-4614-A63E-F8DBD2958128",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en los productos HP y H3C VPN Firewall Module SECPATH1000FE anterior a 5.20.R3177 y SECBLADEFW anterior a 5.20.R3177 permite a atacantes remotos causar una denegaci\u00f3n de servicio a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2013-4840",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-07-28T17:55:06.950",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03993467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03993467"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…