Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-32554

Опубликовано: 23 июн. 2022
Источник: nvd
CVSS3: 9.8
CVSS2: 10
EPSS Низкий

Описание

Pure Storage FlashArray products running Purity//FA 6.2.0 - 6.2.3, 6.1.0 - 6.1.12, 6.0.0 - 6.0.8, 5.3.0 - 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 - 3.2.4, 3.1.0 - 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to possibly exposed credentials for accessing the product’s management interface. The password may be known outside Pure Storage and could be used on an affected system, if reachable, to execute arbitrary instructions with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:purestorage:purity\/\/fa:*:*:*:*:*:*:*:*
Версия до 5.3.18 (исключая)
cpe:2.3:a:purestorage:purity\/\/fa:*:*:*:*:*:*:*:*
Версия от 6.0.0 (включая) до 6.0.9 (исключая)
cpe:2.3:a:purestorage:purity\/\/fa:*:*:*:*:*:*:*:*
Версия от 6.1.0 (включая) до 6.1.13 (исключая)
cpe:2.3:a:purestorage:purity\/\/fa:*:*:*:*:*:*:*:*
Версия от 6.2.0 (включая) до 6.2.4 (исключая)
Конфигурация 2

Одно из

cpe:2.3:a:purestorage:purity\/\/fb:*:*:*:*:*:*:*:*
Версия до 3.1.13 (исключая)
cpe:2.3:a:purestorage:purity\/\/fb:*:*:*:*:*:*:*:*
Версия от 3.2.0 (включая) до 3.2.5 (исключая)
cpe:2.3:a:purestorage:purity\/\/fb:*:*:*:*:*:*:*:*
Версия от 3.3.0 (включая) до 3.3.1 (исключая)

EPSS

Процентиль: 64%
0.00467
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

Pure Storage FlashArray products running Purity//FA 6.2.0 - 6.2.3, 6.1.0 - 6.1.12, 6.0.0 - 6.0.8, 5.3.0 - 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 - 3.2.4, 3.1.0 - 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to possibly exposed credentials for accessing the product’s management interface. The password may be known outside Pure Storage and could be used on an affected system, if reachable, to execute arbitrary instructions with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software.

EPSS

Процентиль: 64%
0.00467
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

NVD-CWE-noinfo