Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2015-6859


HPE Network Switches with software 15.16.x and 15.17.x allow local users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-6860.


Security Impact Summary

This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 7.8, requiring local system access to exploit with relatively low complexity without requiring user interaction requiring only low-level privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 54 products from hp, from hp, from hp and 51 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

First disclosed in 2016, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.


Published

2016-01-05T11:59:05.393

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.9

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-264

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System hp network_switch_software ≤ 15.18.0 Yes
Hardware hp j8692a * No
Hardware hp j8693a * No
Hardware hp j8697a * No
Hardware hp j8698a * No
Hardware hp j8699a * No
Hardware hp j8700a * No
Hardware hp j8715a * No
Hardware hp j8715b * No
Hardware hp j8992a * No
Hardware hp j9091a * No
Hardware hp j9263a * No
Hardware hp j9264a * No
Hardware hp j9265a * No
Hardware hp j9310a * No
Hardware hp j9311a * No
Hardware hp j9447a * No
Hardware hp j9448a * No
Hardware hp j9451a * No
Hardware hp j9452a * No
Hardware hp j9470a * No
Hardware hp j9471a * No
Hardware hp j9472a * No
Hardware hp j9473a * No
Hardware hp j9475a * No
Hardware hp j9532a * No
Hardware hp j9533a * No
Hardware hp j9539a * No
Hardware hp j9540a * No
Hardware hp j9573a * No
Hardware hp j9574a * No
Hardware hp j9575a * No
Hardware hp j9576a * No
Hardware hp j9584a * No
Hardware hp j9585a * No
Hardware hp j9586a * No
Hardware hp j9587a * No
Hardware hp j9588a * No
Hardware hp j9638a * No
Hardware hp j9639a * No
Hardware hp j9640a * No
Hardware hp j9641a * No
Hardware hp j9642a * No
Hardware hp j9643a * No
Hardware hp j9821a * No
Hardware hp j9822a * No
Hardware hp j9823a * No
Hardware hp j9824a * No
Hardware hp j9825a * No
Hardware hp j9826a * No
Hardware hp j9850a * No
Hardware hp j9851a * No
Hardware hp j9866a * No
Hardware hp j9868a * No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For hp's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.