Show plain JSON{"id": "CVE-2020-7114", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2020-04-16T19:15:34.557", "references": [{"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-004.txt", "tags": ["Vendor Advisory"], "source": "security-alert@hpe.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-306"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability exists allowing attackers, when present in the same network segment as ClearPass' management interface, to make changes to certain databases in ClearPass by crafting HTTP packets. As a result of this attack, a possible complete cluster compromise might occur. Resolution: Fixed in 6.7.13, 6.8.4, 6.9.0 and higher."}, {"lang": "es", "value": "Hay una vulnerabilidad que permite a atacantes, cuando est\u00e1n presentes en el mismo segmento de red que la interfaz de administraci\u00f3n de ClearPass, realizar cambios en determinadas bases de datos en ClearPass al crear paquetes HTTP. Como resultado de este ataque, podr\u00eda ocurrir un posible compromiso del cl\u00faster completo. Resoluci\u00f3n: Corregido en las versiones 6.7.13, 6.8.4, 6.9.0 y posteriores."}], "lastModified": "2020-04-23T14:55:10.540", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A93E733-7F7C-45C0-A419-3474745F8CDC", "versionEndExcluding": "6.7.13", "versionStartIncluding": "6.7.0"}, {"criteria": "cpe:2.3:a:arubanetworks:clearpass:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "322D0EFF-351A-4CB3-9379-CEFE7E47F4B2", "versionEndExcluding": "6.8.4", "versionStartIncluding": "6.8.0"}], "operator": "OR"}]}], "sourceIdentifier": "security-alert@hpe.com"}