hitachi storage_plug-in 特权管理不恰当

CVE编号

CVE-2022-2637

利用情况

暂无

补丁情况

N/A

披露时间

2022-10-07
漏洞描述
Incorrect Privilege Assignment vulnerability in Hitachi Storage Plug-in for VMware vCenter allows remote authenticated users to cause privilege escalation. This issue affects: Hitachi Storage Plug-in for VMware vCenter 04.8.0.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 hitachi storage_plug-in 04.8.0 -
运行在以下环境
系统 alibaba_cloud_linux_2.1903 kernel * Up to
(excluding)
4.19.91-27.1.al7
运行在以下环境
系统 alibaba_cloud_linux_3 kernel * Up to
(excluding)
5.10.134-13.al8
运行在以下环境
系统 alma_linux_8 kernel * Up to
(excluding)
4.18.0-425.3.1.rt7.213.el8
运行在以下环境
系统 alma_linux_9 httpd * Up to
(excluding)
2.4.53-7.el9
运行在以下环境
系统 amazon_2 httpd * Up to
(excluding)
2.4.54-1.amzn2
运行在以下环境
系统 amazon_2022 httpd * Up to
(excluding)
2.4.54-3.amzn2022.0.1
运行在以下环境
系统 amazon_2023 httpd * Up to
(excluding)
2.4.54-3.amzn2023.0.4
运行在以下环境
系统 amazon_AMI kernel * Up to
(excluding)
4.14.299-152.520.amzn1
运行在以下环境
系统 anolis_os_7 kernel * Up to
(excluding)
3.10
运行在以下环境
系统 centos_7 kernel * Up to
(excluding)
3.10.0-1160.80.1.el7
运行在以下环境
系统 kylinos_aarch64_V10SP1 httpd * Up to
(excluding)
2.4.43-8.p04.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 httpd * Up to
(excluding)
2.4.43-12.p04.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP3 httpd * Up to
(excluding)
2.4.43-13.p05.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP1 httpd * Up to
(excluding)
2.4.43-8.p04.a.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP3 httpd * Up to
(excluding)
2.4.43-13.p07.a.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP1 httpd * Up to
(excluding)
2.4.43-8.p04.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 httpd * Up to
(excluding)
2.4.43-12.p04.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP3 httpd * Up to
(excluding)
2.4.43-13.p05.ky10
运行在以下环境
系统 opensuse_5.2 kernel * Up to
(excluding)
5.3.18-150300.106.1
运行在以下环境
系统 opensuse_Leap_15.3 kernel * Up to
(excluding)
4.12.14-150100.197.123.1
运行在以下环境
系统 opensuse_Leap_15.4 dtb-al * Up to
(excluding)
5.3.18-150300.59.93.1
运行在以下环境
系统 oracle_7 kernel * Up to
(excluding)
3.10.0-1160.80.1.0.1.el7
运行在以下环境
系统 oracle_8 kernel * Up to
(excluding)
4.18.0-425.3.1.el8
运行在以下环境
系统 oracle_9 httpd * Up to
(excluding)
2.4.53-7.0.1.el9
运行在以下环境
系统 redhat_7 kernel * Up to
(excluding)
3.10.0-1160.80.1.el7
运行在以下环境
系统 redhat_8 kernel * Up to
(excluding)
4.18.0-425.3.1.el8
运行在以下环境
系统 redhat_9 httpd * Up to
(excluding)
2.4.53-7.el9
运行在以下环境
系统 rocky_linux_8 kernel * Up to
(excluding)
4.18.0-425.3.1.rt7.213.el8
运行在以下环境
系统 rocky_linux_9 httpd * Up to
(excluding)
2.4.53-7.el9
运行在以下环境
系统 suse_12_SP5 kernel * Up to
(excluding)
4.12.14-16.109.1
CVSS3评分
8.8
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-269 特权管理不恰当
阿里云安全产品覆盖情况