{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T00:55:02.241","vulnerabilities":[{"cve":{"id":"CVE-2021-22887","sourceIdentifier":"support@hackerone.com","published":"2021-03-16T16:15:14.037","lastModified":"2024-11-21T05:50:50.620","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the BIOS of Pulse Secure (PSA-Series Hardware) models PSA5000 and PSA7000 could allow an attacker to compromise BIOS firmware. This vulnerability can be exploited only as part of an attack chain. Before an attacker can compromise the BIOS, they must exploit the device."},{"lang":"es","value":"Una vulnerabilidad en el BIOS de los modelos Pulse Secure (hardware de la serie PSA) PSA5000 y PSA7000, podría permitir a un atacante comprometer el firmware del BIOS.&#xa0;Esta vulnerabilidad solo puede ser explotada como parte de una cadena de ataque.&#xa0;Antes de que un atacante pueda comprometer el BIOS, deben explotar el dispositivo"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N","baseScore":2.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"support@hackerone.com","type":"Secondary","description":[{"lang":"en","value":"CWE-506"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pulsesecure:psa-5000_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"80CC4081-CCA6-4D44-838F-9EB52FD978C1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pulsesecure:psa-5000:-:*:*:*:*:*:*:*","matchCriteriaId":"B6F03F5E-72B5-4E19-8197-62AC1FCD5199"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pulsesecure:psa-7000_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"C1693B89-44A4-42B1-81F7-E29DDA16ECD4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pulsesecure:psa-7000:-:*:*:*:*:*:*:*","matchCriteriaId":"4997E5B4-0EDA-41E0-8BEF-9297A486F0C0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:supermicro:x10slh-f_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4","matchCriteriaId":"85025F6A-1211-40A3-91E6-331C35207FD2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:supermicro:x10slh-f:-:*:*:*:*:*:*:*","matchCriteriaId":"52A12FF2-6211-4924-AF01-A05886E08D42"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:supermicro:x10sll-f_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4","matchCriteriaId":"8ACBA1D4-F2DF-4A99-A31E-730A4B37C60E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:supermicro:x10sll-f:-:*:*:*:*:*:*:*","matchCriteriaId":"2D4D8487-4B77-4346-9890-65C4B49FAE64"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:supermicro:x10slm-f_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4","matchCriteriaId":"2CAD83CA-5831-40E2-90DF-DE47BF1054B3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:supermicro:x10slm-f:-:*:*:*:*:*:*:*","matchCriteriaId":"5AF19EEA-9C85-4410-B320-8A3092772B25"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:supermicro:x10sll\\+f_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4","matchCriteriaId":"E0B1A1EC-7506-4929-8BCE-2787C7A2A447"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:supermicro:x10sll\\+f:-:*:*:*:*:*:*:*","matchCriteriaId":"F5C61A1D-531F-436F-9AB4-478783DF5791"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:supermicro:x10slm\\+-f_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4","matchCriteriaId":"B0A630E7-8C70-4221-A599-BEAA8C3AE70E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:supermicro:x10slm\\+-f:-:*:*:*:*:*:*:*","matchCriteriaId":"4B44DFDA-7DC7-40E2-80C8-A3BCEC13DD6C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:supermicro:x10slm\\+ln4f_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4","matchCriteriaId":"F5807F75-CEAC-4907-B728-E69419F31FD3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:supermicro:x10slm\\+ln4f:-:*:*:*:*:*:*:*","matchCriteriaId":"613FB90A-028B-40F3-8904-DBA0A2059138"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:supermicro:x10sla-f_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4","matchCriteriaId":"B67CE7D3-A95D-4684-A1D0-0231A6202624"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:supermicro:x10sla-f:-:*:*:*:*:*:*:*","matchCriteriaId":"B2609DD5-F528-4D1D-9C05-2F1EC5913D1A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:supermicro:x10sl7-f_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4","matchCriteriaId":"C24F289D-1DFC-4CC6-B532-57D68A7149E9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:supermicro:x10sl7-f:-:*:*:*:*:*:*:*","matchCriteriaId":"BA44D755-24EE-4316-96E1-FA05AB532074"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:supermicro:x10sll-s_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4","matchCriteriaId":"42D69601-5076-4477-B944-FBA2C52571B1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:supermicro:x10sll-s:-:*:*:*:*:*:*:*","matchCriteriaId":"D7856BB2-765E-44C4-BA7E-6074D8B0991F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:supermicro:x10sll-sf_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4","matchCriteriaId":"0D26D0C4-0978-41AB-90EE-ABB6086BFB7D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:supermicro:x10sll-sf:-:*:*:*:*:*:*:*","matchCriteriaId":"90A441DC-264D-4BF1-9920-5551B9BB4E71"}]}]}],"references":[{"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44712","source":"support@hackerone.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.supermicro.com/en/support/security/Trickbot","source":"support@hackerone.com","tags":["Third Party Advisory"]},{"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44712","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.supermicro.com/en/support/security/Trickbot","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}