Lucene search

K
cve[email protected]CVE-2021-25133
HistoryJan 29, 2021 - 7:15 p.m.

CVE-2021-25133

2021-01-2919:15:14
CWE-120
web.nvd.nist.gov
41
2
cve-2021-25133
baseboard management controller
bmc
hpe cloudline
server
buffer overflow
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.6%

The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setradiusconfig_func function.

Affected configurations

NVD
Node
hpecloudline_cl3100_gen10_server_firmwareMatch1.08.0.0
OR
hpecloudline_cl3100_gen10_server_firmwareMatch1.10.0.0
AND
hpecloudline_cl3100_gen10_serverMatch-
Node
hpecloudline_cl4100_gen10_server_firmwareMatch1.08.0.0
OR
hpecloudline_cl4100_gen10_server_firmwareMatch1.10.0.0
AND
hpecloudline_cl4100_gen10_serverMatch-
Node
hpecloudline_cl5200_gen9_server_firmwareMatch1.07.0.0
AND
hpecloudline_cl5200_gen9_serverMatch-
Node
hpecloudline_cl5800_gen10_server_firmwareMatch1.08.0.0
AND
hpecloudline_cl5800_gen10_serverMatch-
Node
hpecloudline_cl5800_gen9_server_firmwareMatch1.09.0.0
AND
hpecloudline_cl5800_gen9_serverMatch-

CNA Affected

[
  {
    "product": "HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Version. 1.09.0.0"
      },
      {
        "status": "affected",
        "version": "Version 1.07.0.0"
      },
      {
        "status": "affected",
        "version": "Version 1.10.0.0"
      },
      {
        "status": "affected",
        "version": "Version  1.10.0.0"
      },
      {
        "status": "affected",
        "version": "Version 1.08.0.0"
      }
    ]
  }
]

Social References

More

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.6%

Related for CVE-2021-25133