Vulnerabilites related to Micro Focus - Micro Focus Network Automation and Micro Focus Network Operations Management (NOM)
CVE-2019-3493 (GCVE-0-2019-3493)
Vulnerability from cvelistv5
Published
2019-04-29 15:47
Modified
2024-08-04 19:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote Code Execution
Summary
A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Micro Focus | Micro Focus Network Automation and Micro Focus Network Operations Management (NOM) |
Version: network operations management all Version: network automation 9.20 9.21 10.00 10.10 10.20 10.40 10.30 10.50 2018.05 2018.08 2018.11 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.509Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://softwaresupport.softwaregrp.com/doc/KM03407763" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Micro Focus Network Automation and Micro Focus Network Operations Management (NOM)", "vendor": "Micro Focus", "versions": [ { "status": "affected", "version": "network operations management all" }, { "status": "affected", "version": "network automation 9.20 9.21 10.00 10.10 10.20 10.40 10.30 10.50 2018.05 2018.08 2018.11" } ] } ], "descriptions": [ { "lang": "en", "value": "A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:46", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://softwaresupport.softwaregrp.com/doc/KM03407763" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "ID": "CVE-2019-3493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Micro Focus Network Automation and Micro Focus Network Operations Management (NOM)", "version": { "version_data": [ { "version_value": "network operations management all" }, { "version_value": "network automation 9.20 9.21 10.00 10.10 10.20 10.40 10.30 10.50 2018.05 2018.08 2018.11" } ] } } ] }, "vendor_name": "Micro Focus" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://softwaresupport.softwaregrp.com/doc/KM03407763", "refsource": "CONFIRM", "url": "https://softwaresupport.softwaregrp.com/doc/KM03407763" } ] } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2019-3493", "datePublished": "2019-04-29T15:47:08", "dateReserved": "2018-12-31T00:00:00", "dateUpdated": "2024-08-04T19:12:09.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }