Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hccp-6fqj-76m5

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.

HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.

EPSS

Процентиль: 54%
0.00307
Низкий

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 6.6
nvd
больше 5 лет назад

HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.

EPSS

Процентиль: 54%
0.00307
Низкий

Дефекты

CWE-20