The vulnerability could be remotely exploited to bypass authentication.
References
| Link | Resource |
|---|---|
| https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04663en_us&docLocale=en_US | Vendor Advisory |
| https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04663en_us&docLocale=en_US | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 08:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04663en_us&docLocale=en_US - Vendor Advisory |
10 Oct 2024, 12:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:hp:3par_service_processor_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:hp:3par_service_processor:*:*:*:*:*:*:*:* |
|
| First Time |
Hp 3par Service Processor
Hp 3par Service Processor Firmware Hp |
05 Sep 2024, 17:12
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04663en_us&docLocale=en_US - Vendor Advisory | |
| First Time |
Hpe 3par Service Provider
Hpe |
|
| CPE | cpe:2.3:o:hpe:3par_service_provider:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo |
01 Aug 2024, 13:46
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-287 | |
| Summary |
|
16 Jul 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-07-16 16:15
Updated : 2024-11-21 08:56
NVD link : CVE-2024-22442
Mitre link : CVE-2024-22442
CVE.ORG link : CVE-2024-22442
JSON object : View
Products Affected
hp
- 3par_service_processor_firmware
- 3par_service_processor
CWE
