CVE-2021-22267
Published Feb 9, 2021
Last updated 4 years ago
Overview
- Description
- Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows a remote replay attack for T0320L01^ABP through T0320L01^ABZ, T0952L01^AAH through T0952L01^AAR, T0986L01 through T0986L01^AAF, T0665L01^AAP, and T0662L01^AAP (L) and T0320H01^ABO through T0320H01^ABY, T0952H01^AAG through T0952H01^AAQ, T0986H01 through T0986H01^AAE, T0665H01^AAO, and T0662H01^AAO (J and H).
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-294
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:nonstop:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "55858925-B0CD-4C4D-8CAA-DFA1B36C0DE0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "854CE3D0-C2E9-475D-A079-C4185A2BE4C6", "versionEndIncluding": "06.23.01", "versionStartIncluding": "06.03" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E42D9831-656D-47D0-BFEA-B57E0AF445E8", "versionEndIncluding": "19.08.00", "versionStartIncluding": "15.08.00" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "204FCE16-72AA-4516-B2EB-B813A429DBE2", "versionEndIncluding": "t0320h01\\^acc", "versionStartIncluding": "t0320h01\\^abw" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7C43A33-0CBE-473F-844D-2C18721C3555", "versionEndIncluding": "t0952h01\\^aaw", "versionStartIncluding": "t0952h01\\^aaq" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18AC804E-31E2-4A9E-A218-C130DB00A779", "versionEndIncluding": "t0952l01\\^aax", "versionStartIncluding": "t0952l01\\^aar" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47A9BFCE-6B14-46F0-A12B-4974D114643F", "versionEndIncluding": "t0986h01\\^aai", "versionStartIncluding": "t0986h01\\^aac" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "667CD5A6-FA80-4265-BB1C-407CAB0F4BE3", "versionEndIncluding": "t0986l01\\^aaj", "versionStartIncluding": "t0986l01\\^aad" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:15.02.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0EB6DB3-9698-4B2A-ABC4-51B1BCF6A3E3" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:15.02.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8608EB2-4214-425E-823A-441AA00C7A38" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:t0320l01\\^aby:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FE0E6DB-7571-484A-A414-5A0FB41FC4DE" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:t0320l01\\^acd:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D2873C5-48BB-40E5-9168-50DEE865D60C" } ], "operator": "OR" } ], "operator": "AND" } ]