Show plain JSON{"id": "CVE-2017-13988", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2017-09-30T01:29:01.287", "references": [{"url": "http://www.securityfocus.com/bid/100935", "source": "security@opentext.com"}, {"url": "https://softwaresupport.hpe.com/km/KM02944672", "source": "security@opentext.com"}, {"url": "http://www.securityfocus.com/bid/100935", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://softwaresupport.hpe.com/km/KM02944672", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "An improper access control vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows unauthorized users to alter the maximum size of storage groups and enable/disable the setting for the 'follow schedule' function."}, {"lang": "es", "value": "Una vulnerabilidad de control de acceso incorrecto en ArcSight ESM y ArcSight ESM Express en cualquier versi\u00f3n 6.x anterior a la 6.9.1c Patch 4 o 6.11.0 Patch 1 permite que los usuarios sin autorizaci\u00f3n alteren el tama\u00f1o m\u00e1ximo de grupos de almacenamiento y habiliten/deshabiliten el ajuste para la funci\u00f3n 'follow schedule'."}], "lastModified": "2025-04-20T01:37:25.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D78B3322-5139-498E-881E-107A316BF27A"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.0c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EC0FEF9-75FC-4B80-949F-0D1BFFC77AE6"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B6AAF29-51F6-424A-BE5A-AE886F12A707"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10842D30-C2A4-48B5-BC1E-45A4B8C8D677"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88A63A99-5FC1-4235-A390-3EAE61154B33"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5c:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60E11A80-D28D-47B9-83F3-045F33983797"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41658ED4-D03A-471C-9E83-A71B19229910"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.8c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FB25793-D70A-4AC8-947A-3C2E153BDE9B"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.0c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D3F4F0A-B866-4DBC-8F83-5D558FF55E9B"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D902FDA0-B001-4C9A-82B8-2DA0554A599F"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE8F1C31-174C-473C-BF0C-E2B25D35EBA0"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A53F2315-90FE-4722-99BF-ACD068E14837"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7662BB37-2990-4B2E-9444-DA2EC5EEA7D1"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A04F201-32A6-43CA-A4D2-72E5D16B664A"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3FC6544-94EA-407A-B2DE-B72FEB0D6B9F"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.0c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF7EDBBF-A5E5-4142-9436-4203CF00AA3F"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79A65366-9D30-47A3-914F-32E7D31442CE"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B7802C5-9294-4BD7-A0E6-8A240BC73EEE"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9423B736-E39D-4FDE-A53D-F59D1A5F75FD"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5c:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8ABA543C-A5CB-48B8-A0FD-4909330E8795"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5112A04D-B67A-4006-87E2-8B59A05E0749"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.8c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4E444EC-4DFE-48A5-88E2-551D062C3A0E"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "173D8141-F1E7-4C63-A22D-F33BE733EBC7"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "836D66B2-2D0D-4AA6-8D26-1FB4B7136C93"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24F1751D-5B62-4634-9619-7C572DC14C98"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AF52F9B-3A0E-42CE-A8E2-C6325041D2DE"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D855C29-8407-4E77-8E25-6D4AA03F0859"}, {"criteria": "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08AC0017-DBCA-4E8A-ACA0-34E845802D45"}], "operator": "OR"}]}], "sourceIdentifier": "security@opentext.com"}