A broken access control (BAC) vulnerability in the web-based management interface could allow an authenticated remote attacker with low privileges to view sensitive information. Successful exploitation of this vulnerability could enable the attacker to disclose sensitive data.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 18 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics |
ssvc
|
Tue, 18 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A broken access control (BAC) vulnerability in the web-based management interface could allow an authenticated remote attacker with low privileges to view sensitive information. Successful exploitation of this vulnerability could enable the attacker to disclose sensitive data. | |
| Title | Authenticated Broken Access Control (BAC) in REST API Configuration Service | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2025-11-18T20:56:20.675Z
Reserved: 2025-04-16T01:28:25.374Z
Link: CVE-2025-37160
Updated: 2025-11-18T20:55:35.510Z
Status : Received
Published: 2025-11-18T19:15:48.133
Modified: 2025-11-18T22:15:49.020
Link: CVE-2025-37160
No data.
OpenCVE Enrichment
No data.