CVE-2014-4811
12.09.2014, 01:55
IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | san_volume_controller_software | 6.1.0.0 |
ibm | san_volume_controller_software | 6.1.0.1 |
ibm | san_volume_controller_software | 6.1.0.2 |
ibm | san_volume_controller_software | 6.1.0.3 |
ibm | san_volume_controller_software | 6.1.0.4 |
ibm | san_volume_controller_software | 6.1.0.5 |
ibm | san_volume_controller_software | 6.1.0.6 |
ibm | san_volume_controller_software | 6.1.0.7 |
ibm | san_volume_controller_software | 6.1.0.8 |
ibm | san_volume_controller_software | 6.1.0.9 |
ibm | san_volume_controller_software | 6.1.0.10 |
ibm | san_volume_controller_software | 6.2.0.0 |
ibm | san_volume_controller_software | 6.2.0.1 |
ibm | san_volume_controller_software | 6.2.0.2 |
ibm | san_volume_controller_software | 6.2.0.3 |
ibm | san_volume_controller_software | 6.2.0.4 |
ibm | san_volume_controller_software | 6.2.0.5 |
ibm | san_volume_controller_software | 6.2.0.6 |
ibm | san_volume_controller_software | 6.3.0.0 |
ibm | san_volume_controller_software | 6.3.0.1 |
ibm | san_volume_controller_software | 6.3.0.2 |
ibm | san_volume_controller_software | 6.3.0.3 |
ibm | san_volume_controller_software | 6.3.0.4 |
ibm | san_volume_controller_software | 6.3.0.5 |
ibm | san_volume_controller_software | 6.3.0.6 |
ibm | san_volume_controller_software | 6.3.0.7 |
ibm | san_volume_controller_software | 6.4.0.0 |
ibm | san_volume_controller_software | 6.4.0.1 |
ibm | san_volume_controller_software | 6.4.0.2 |
ibm | san_volume_controller_software | 6.4.0.3 |
ibm | san_volume_controller_software | 6.4.0.4 |
ibm | san_volume_controller_software | 6.4.1.1 |
ibm | san_volume_controller_software | 6.4.1.2 |
ibm | san_volume_controller_software | 6.4.1.3 |
ibm | san_volume_controller_software | 6.4.1.4 |
ibm | san_volume_controller_software | 6.4.1.5 |
ibm | san_volume_controller_software | 6.4.1.6 |
ibm | san_volume_controller_software | 6.4.1.7 |
ibm | san_volume_controller_software | 6.4.1.8 |
ibm | san_volume_controller_software | 7.1.0.0 |
ibm | san_volume_controller_software | 7.1.0.1 |
ibm | san_volume_controller_software | 7.1.0.2 |
ibm | san_volume_controller_software | 7.1.0.3 |
ibm | san_volume_controller_software | 7.1.0.5 |
ibm | san_volume_controller_software | 7.1.0.6 |
ibm | san_volume_controller_software | 7.1.0.7 |
ibm | san_volume_controller_software | 7.2.0.0 |
ibm | san_volume_controller_software | 7.2.0.1 |
ibm | san_volume_controller_software | 7.2.0.2 |
ibm | san_volume_controller_software | 7.2.0.3 |
ibm | san_volume_controller_software | 7.2.0.4 |
ibm | san_volume_controller_software | 7.2.0.5 |
ibm | san_volume_controller_software | 7.2.0.6 |
ibm | san_volume_controller_software | 7.2.0.7 |
ibm | storwize_v3500 | - |
ibm | storwize_v3700 | - |
ibm | storwize_v5000 | - |
ibm | storwize_v7000 | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References