ePrivacy and GPDR Cookie Consent by Cookie Consent
HPE Virtual Connect SE 16Gb Fibre Channel Module privilege escalation – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on May 11th, 2019 📆 | 2754 Views ⚑


HPE Virtual Connect SE 16Gb Fibre Channel Module privilege escalation

CVSS Meta Temp ScoreCurrent Exploit Price (≈)

A vulnerability, which was classified as critical, was found in HPE Virtual Connect SE 16Gb Fibre Channel Module (the affected version unknown). This affects a function. The manipulation with an unknown input leads to a privilege escalation vulnerability. CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was released 05/10/2019. It is possible to read the advisory at support.hpe.com. This vulnerability is uniquely identified as CVE-2018-7120 since 02/15/2018. Attacking locally is a requirement. The successful exploitation needs a single authentication. The technical details are unknown and an exploit is not publicly available.

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.



VulDB Meta Base Score: 5.3
VulDB Meta Temp Score: 5.3

VulDB Base Score: 5.3
VulDB Temp Score: 5.3
VulDB Vector: ?
VulDB Reliability: ?


VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No

Availability: ?
Status: Not defined

Price Prediction: ?
Current Price Estimation: ?

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: no mitigation known
0-Day Time: ?02/15/2018 CVE assigned
05/10/2019 +449 days Advisory disclosed
05/11/2019 +1 days VulDB entry created
05/11/2019 +0 days VulDB last updateAdvisory: support.hpe.com

CVE: CVE-2018-7120 (?)

Created: 05/11/2019 02:55 AM
Complete: ?


No comments yet. Please log in to comment.

Use the official API to access entries easily!


Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *