{"containers":{"cna":{"affected":[{"product":"HPE MSE Msg Gw application E-LTU","vendor":"HPE","versions":[{"status":"affected","version":"prior to version 3.2"}]}],"descriptions":[{"lang":"en","value":"HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide."}],"problemTypes":[{"descriptions":[{"description":"remote access restriction bypass; remote user validation failure","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-07-17T21:12:55.000Z","orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03979en_us"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security-alert@hpe.com","ID":"CVE-2019-12000","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"HPE MSE Msg Gw application E-LTU","version":{"version_data":[{"version_value":"prior to version 3.2"}]}}]},"vendor_name":"HPE"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"remote access restriction bypass; remote user validation failure"}]}]},"references":{"reference_data":[{"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03979en_us","refsource":"CONFIRM","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03979en_us"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T23:10:30.180Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03979en_us"}]}]},"cveMetadata":{"assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","assignerShortName":"hpe","cveId":"CVE-2019-12000","datePublished":"2020-07-17T21:12:55.000Z","dateReserved":"2019-05-13T00:00:00.000Z","dateUpdated":"2024-08-04T23:10:30.180Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}