CVE-2021-3191
Published Feb 9, 2021
Last updated 4 years ago
Overview
- Description
- Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows Remote Unauthorized Access for T0320L01^ABY and T0320L01^ACD, T0952L01^AAR through T0952L01^AAX, and T0986L01^AAD through T0986L01^AAJ (L) and T0320H01^ABW through T0320H01^ACC, T0952H01^AAQ through T0952H01^AAW, and T0986H01^AAC through T0986H01^AAI (J and H).
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:nonstop:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "55858925-B0CD-4C4D-8CAA-DFA1B36C0DE0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "854CE3D0-C2E9-475D-A079-C4185A2BE4C6", "versionEndIncluding": "06.23.01", "versionStartIncluding": "06.03" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E42D9831-656D-47D0-BFEA-B57E0AF445E8", "versionEndIncluding": "19.08.00", "versionStartIncluding": "15.08.00" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "204FCE16-72AA-4516-B2EB-B813A429DBE2", "versionEndIncluding": "t0320h01\\^acc", "versionStartIncluding": "t0320h01\\^abw" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7C43A33-0CBE-473F-844D-2C18721C3555", "versionEndIncluding": "t0952h01\\^aaw", "versionStartIncluding": "t0952h01\\^aaq" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18AC804E-31E2-4A9E-A218-C130DB00A779", "versionEndIncluding": "t0952l01\\^aax", "versionStartIncluding": "t0952l01\\^aar" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47A9BFCE-6B14-46F0-A12B-4974D114643F", "versionEndIncluding": "t0986h01\\^aai", "versionStartIncluding": "t0986h01\\^aac" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "667CD5A6-FA80-4265-BB1C-407CAB0F4BE3", "versionEndIncluding": "t0986l01\\^aaj", "versionStartIncluding": "t0986l01\\^aad" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:15.02.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0EB6DB3-9698-4B2A-ABC4-51B1BCF6A3E3" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:15.02.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8608EB2-4214-425E-823A-441AA00C7A38" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:t0320l01\\^aby:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FE0E6DB-7571-484A-A414-5A0FB41FC4DE" }, { "criteria": "cpe:2.3:a:hpe:web_viewpoint:t0320l01\\^acd:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D2873C5-48BB-40E5-9168-50DEE865D60C" } ], "operator": "OR" } ], "operator": "AND" } ]