CVE-2018-1464
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
17/05/2018
Last modified:
19/08/2020
Description
IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) could allow an authenticated user to obtain sensitive information that they should not have authorization to read. IBM X-Force ID: 140395.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* | 6.1.0.0 (including) | 7.5.0.14 (excluding) |
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* | 7.7.0.0 (including) | 7.7.1.9 (excluding) |
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* | 7.8.0.0 (including) | 7.8.1.6 (excluding) |
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* | 8.1.1.0 (including) | 8.1.1.2 (excluding) |
cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:* | 8.1.2.0 (including) | 8.1.2.1 (excluding) |
cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* | 6.1.0.0 (including) | 7.5.0.14 (excluding) |
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* | 7.7.0.0 (including) | 7.7.1.9 (excluding) |
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* | 7.8.0.0 (including) | 7.8.1.6 (excluding) |
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* | 8.1.1.0 (including) | 8.1.1.2 (excluding) |
cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:* | 8.1.2.0 (including) | 8.1.2.1 (excluding) |
cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:* | 6.1.0.0 (including) | 7.5.0.14 (excluding) |
cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:* | 7.7.0.0 (including) | 7.7.1.9 (excluding) |
cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:* | 7.8.0.0 (including) | 7.8.1.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page