FKIE_CVE-2013-4840
Vulnerability from fkie_nvd - Published: 2014-07-28 17:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| h3c | secbladefw | 5.20 | |
| h3c | secpath1000fe | 5.20 | |
| h3c | f1000-e_vpn_firewall | 0235a26g | |
| h3c | s5820_secblade_vpn_firewall_module | 0231a94j | |
| h3c | s7500e_secblade_vpn_firewall_module | 0231a832 | |
| h3c | s9500e_secblade_vpn_firewall_module | 0231a0av | |
| h3c | sr66_gigabit_firewall_module | 0231a88a | |
| h3c | sr88_firewall_processing_module | 0231a88l | |
| hp | secbladefw | 5.20 | |
| hp | secpath1000fe | 5.20 | |
| hp | 10500\/7500_advanced_vpn_firewall_module | jd249a | |
| hp | 12500_vpn_firewall_module | jc635a | |
| hp | 5820_vpn_firewall_module | jd255a | |
| hp | 6600_firewall_processing_rtr_module | jd250a | |
| hp | 8800_firewall_processing_module | jd251a | |
| hp | 9500_vpn_firewall_module | jd245a | |
| hp | s1000-e_vpn_firewall_appliance | jd272a |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:h3c:secbladefw:5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "5DD12127-958E-428E-83A7-CFC571798791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:h3c:secpath1000fe:5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AFCC50-27E4-438C-9C04-78D5C44BC825",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:h3c:f1000-e_vpn_firewall:0235a26g:*:*:*:*:*:*:*",
"matchCriteriaId": "6EACFEAB-82BC-4193-8EAC-F59D2F028706",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:h3c:s5820_secblade_vpn_firewall_module:0231a94j:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B6AA2D-BE4A-4380-82D6-B7E9D549E15B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:h3c:s7500e_secblade_vpn_firewall_module:0231a832:*:*:*:*:*:*:*",
"matchCriteriaId": "CC847B9B-080B-4F7E-BFF6-DE2E37F11783",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:h3c:s9500e_secblade_vpn_firewall_module:0231a0av:*:*:*:*:*:*:*",
"matchCriteriaId": "3E411D72-F41D-4D44-81AB-4C07A8FE9508",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:h3c:sr66_gigabit_firewall_module:0231a88a:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA2C79B-277C-4248-8EBE-4DDC1E68FFD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:h3c:sr88_firewall_processing_module:0231a88l:*:*:*:*:*:*:*",
"matchCriteriaId": "107AA4CD-C6A0-491E-8AEF-A8351F5817A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hp:secbladefw:5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D904D558-F2A1-481E-8385-DB0725D0F39A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:secpath1000fe:5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "C2BA2777-B883-451C-AF6A-DF644EDFB180",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hp:10500\\/7500_advanced_vpn_firewall_module:jd249a:*:*:*:*:*:*:*",
"matchCriteriaId": "E7ACA705-1A73-4B85-858E-CAD60C1A8B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:hp:12500_vpn_firewall_module:jc635a:*:*:*:*:*:*:*",
"matchCriteriaId": "75DBDC67-9EF2-4378-A9A4-931F533A86A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:hp:5820_vpn_firewall_module:jd255a:*:*:*:*:*:*:*",
"matchCriteriaId": "0779333D-A830-4806-80A7-D26CC3EF4505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:hp:6600_firewall_processing_rtr_module:jd250a:*:*:*:*:*:*:*",
"matchCriteriaId": "47492362-5B20-458D-BAF9-77694C305E08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:hp:8800_firewall_processing_module:jd251a:*:*:*:*:*:*:*",
"matchCriteriaId": "044F78E3-2F84-4620-95B4-86ACB4FDC18C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:hp:9500_vpn_firewall_module:jd245a:*:*:*:*:*:*:*",
"matchCriteriaId": "47981D1E-0212-4E89-BF8E-67DCDFE27F1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:hp:s1000-e_vpn_firewall_appliance:jd272a:*:*:*:*:*:*:*",
"matchCriteriaId": "99D1883B-029F-4614-A63E-F8DBD2958128",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en los productos HP y H3C VPN Firewall Module SECPATH1000FE anterior a 5.20.R3177 y SECBLADEFW anterior a 5.20.R3177 permite a atacantes remotos causar una denegaci\u00f3n de servicio a trav\u00e9s de vectores desconocidos."
}
],
"id": "CVE-2013-4840",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-07-28T17:55:06.950",
"references": [
{
"source": "hp-security-alert@hp.com",
"tags": [
"Vendor Advisory"
],
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03993467"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03993467"
}
],
"sourceIdentifier": "hp-security-alert@hp.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…