{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T18:50:34.881","vulnerabilities":[{"cve":{"id":"CVE-2021-20487","sourceIdentifier":"psirt@us.ibm.com","published":"2021-05-26T17:15:14.260","lastModified":"2024-11-21T05:46:39.383","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Power9 Self Boot Engine(SBE) could allow a privileged user to inject malicious code and compromise the integrity of the host firmware bypassing the host firmware signature verification process."},{"lang":"es","value":"IBM Power9 Self Boot Engine (SBE), podría permitir a un usuario privilegiado inyectar código malicioso y comprometer la integridad del firmware del host al omitir el proceso de comprobación de la firma del firmware del host"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0}],"cvssMetricV30":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-347"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:power9_system_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"fw930.00","versionEndExcluding":"fw930.30","matchCriteriaId":"CCEDA6C8-69E8-455C-AC29-5424603CD45B"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:power9_system_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"fw940.00","versionEndExcluding":"fw940.20","matchCriteriaId":"A672A461-81E2-4B42-BF2A-6AEE3FEA0568"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9008-22l:-:*:*:*:*:*:*:*","matchCriteriaId":"E18BF499-CBDC-4608-A613-ECD3DB1E3338"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9009-22a:-:*:*:*:*:*:*:*","matchCriteriaId":"57588DE0-FC4C-4E38-A51D-2878764D98B7"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9009-41a:-:*:*:*:*:*:*:*","matchCriteriaId":"4190878F-C66E-4AFA-8BEE-1577EF02AB90"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9009-42a:-:*:*:*:*:*:*:*","matchCriteriaId":"3880DCD3-E0E8-48BB-A3BE-7E97574B3CFB"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9040-mr9:-:*:*:*:*:*:*:*","matchCriteriaId":"4893C7F3-0CC9-48BF-805D-45E4F7288244"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9080-m9s:-:*:*:*:*:*:*:*","matchCriteriaId":"1A10ED3B-CB3F-426A-81C9-710683927B2A"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9223-22h:-:*:*:*:*:*:*:*","matchCriteriaId":"B7194BCD-0DA3-4CDA-A133-A11A6F4C6020"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9223-42h:-:*:*:*:*:*:*:*","matchCriteriaId":"EB13C466-5751-4C96-8E37-AEC0F61DECF9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:power9_system_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"fw950.00","matchCriteriaId":"F35A54AD-5DED-4D55-BA5E-42B752B9E6FF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9009-22g:-:*:*:*:*:*:*:*","matchCriteriaId":"BFB756EE-B71D-4E5F-B84B-E5A1C8FBCC05"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9009-41g:-:*:*:*:*:*:*:*","matchCriteriaId":"33DA8E99-1693-42EB-B31E-1907C4789EDE"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9009-42g:-:*:*:*:*:*:*:*","matchCriteriaId":"037C5223-B23E-4E97-A521-97EF71FE5A48"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9223-22s:-:*:*:*:*:*:*:*","matchCriteriaId":"46ECB3A0-0AEB-4B81-8F8A-3CFDFA18B6FB"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9223-42s:-:*:*:*:*:*:*:*","matchCriteriaId":"509B153F-215A-48E7-B643-50E6846F6F16"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:scale-out_lc_system_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"op940.20","matchCriteriaId":"D7F76191-BD6D-43D5-94A4-3C9E1DBA231D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:8335-gth:-:*:*:*:*:*:*:*","matchCriteriaId":"3113AD78-CB3E-4288-A83B-2FBC7F96F7C2"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:8335-gtx:-:*:*:*:*:*:*:*","matchCriteriaId":"C70F690D-3385-43F5-ABF0-CB5CA05B65BF"},{"vulnerable":false,"criteria":"cpe:2.3:h:ibm:9183-22x:-:*:*:*:*:*:*:*","matchCriteriaId":"80232C68-A3A4-4236-8478-0A9EA97C349E"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/197730","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6455911","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/197730","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6455911","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}