{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-23054","assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","state":"PUBLISHED","assignerShortName":"hpe","dateReserved":"2025-01-10T16:27:25.924Z","datePublished":"2025-01-28T17:17:17.694Z","dateUpdated":"2025-03-13T14:27:35.564Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"HPE Aruba Networking Fabric Composer (AFC)","vendor":"Hewlett Packard Enterprise (HPE)","versions":[{"lessThanOrEqual":"7.1.0","status":"affected","version":"7.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"m0x_noob via HPE Aruba Networking's Bug Bounty Program"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an authenticated low privilege operator user to perform operations not allowed by their privilege level. Successful exploitation could allow an attacker to manipulate user generated files, potentially leading to unauthorized changes in critical system configurations.<br>"}],"value":"A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an authenticated low privilege operator user to perform operations not allowed by their privilege level. Successful exploitation could allow an attacker to manipulate user generated files, potentially leading to unauthorized changes in critical system configurations."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe","dateUpdated":"2025-01-28T17:24:31.210Z"},"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04775en_us&docLocale=en_US"}],"source":{"advisory":"HPESBNW04775","discovery":"EXTERNAL"},"title":"Authenticated Response Manipulation allows Unauthorized Actions in Management Interface","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-863","lang":"en","description":"CWE-863 Incorrect Authorization"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-28T18:30:25.310772Z","id":"CVE-2025-23054","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-13T14:27:35.564Z"}}]}}