{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T12:30:10.881","vulnerabilities":[{"cve":{"id":"CVE-2021-26581","sourceIdentifier":"security-alert@hpe.com","published":"2021-04-01T19:15:13.887","lastModified":"2024-11-21T05:56:31.590","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A potential security vulnerability has been identified in HPE Superdome Flex server. A denial of service attack can be remotely exploited leaving hung connections to the BMC web interface. The monarch BMC must be rebooted to recover from this situation. Other BMC management is not impacted. HPE has made the following software update to resolve the vulnerability in HPE Superdome Flex Server: Superdome Flex Server Firmware 3.30.142 or later."},{"lang":"es","value":"Se ha identificado una vulnerabilidad de seguridad potencial en el servidor HPE Superdome Flex.&#xa0;Un ataque de denegación de servicio se puede explotar remotamentea dejando conexiones colgadas en la interfaz web de BMC.&#xa0;El monarch BMC debe reiniciarse para recuperarse de esta situación.&#xa0;Otra gestión de BMC no está afectada.&#xa0;HPE ha realizado la siguiente actualización de software para resolver la vulnerabilidad en HPE Superdome Flex Server: Superdome Flex Server Firmware versión 3.30.142 o posterior."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hpe:superdome_flex_server_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.30.142","matchCriteriaId":"9C8D1DC0-6F06-465A-B3C4-BD7D0ED3C713"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hpe:superdome_flex_server:-:*:*:*:*:*:*:*","matchCriteriaId":"74B3DA6F-91D3-4C17-A34B-6AA6B9642B3F"}]}]}],"references":[{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04102en_us","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04102en_us","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}