Vulnerabilites related to dell - dp4400
CVE-2023-44277 (GCVE-0-2023-44277)
Vulnerability from cvelistv5
Published
2023-12-14 15:05
Modified
2024-08-02 19:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:52.006Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 " } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "ell Technologies would like to thank Jakub Brzozowski (redfr0g), Franciszek Kalinowski, and Stanis\u0142aw Koza from STM Cyber for reporting these issues. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:05:01.367Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44277", "datePublished": "2023-12-14T15:05:01.367Z", "dateReserved": "2023-09-28T09:25:45.713Z", "dateUpdated": "2024-08-02T19:59:52.006Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28974 (GCVE-0-2024-28974)
Vulnerability from cvelistv5
Published
2024-05-29 15:21
Modified
2024-08-02 01:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-326 - Inadequate Encryption Strength
Summary
Dell Data Protection Advisor, version(s) 19.9, contain(s) an Inadequate Encryption Strength vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dell | Data Protection Advisor |
Version: 19.5 ≤ 19.9 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:dell:emc_powerprotect_data_protection_appliance:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emc_powerprotect_data_protection_appliance", "vendor": "dell", "versions": [ { "lessThanOrEqual": "2.7.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:dell:emc_data_protection_advisor:19.5:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emc_data_protection_advisor", "vendor": "dell", "versions": [ { "lessThanOrEqual": "19.9", "status": "affected", "version": "19.5", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-28974", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-30T18:13:38.492130Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T15:34:46.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:03:51.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000225088/dsa-2024-192-security-update-for-data-protection-advisor-and-powerprotect-dp-series-appliance-idpa-for-multiple-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Data Protection Advisor", "vendor": "Dell", "versions": [ { "lessThanOrEqual": "19.9", "status": "affected", "version": "19.5", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "PowerProtect DP Series Appliance (IDPA)", "vendor": "Dell", "versions": [ { "lessThanOrEqual": "2.7.6", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "datePublic": "2024-05-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell Data Protection Advisor, version(s) 19.9, contain(s) an Inadequate Encryption Strength vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service." } ], "value": "Dell Data Protection Advisor, version(s) 19.9, contain(s) an Inadequate Encryption Strength vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-326", "description": "CWE-326: Inadequate Encryption Strength", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-29T15:21:22.953Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000225088/dsa-2024-192-security-update-for-data-protection-advisor-and-powerprotect-dp-series-appliance-idpa-for-multiple-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-28974", "datePublished": "2024-05-29T15:21:22.953Z", "dateReserved": "2024-03-13T15:44:22.628Z", "dateUpdated": "2024-08-02T01:03:51.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44284 (GCVE-0-2023-44284)
Vulnerability from cvelistv5
Published
2023-12-14 15:26
Modified
2024-11-21 16:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized read access to application data.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44284", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T16:19:54.936040Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T16:20:17.129Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Jakub Brzozowski (redfr0g), Franciszek Kalinowski, and Stanis\u0142aw Koza from STM Cyber for reporting these issues. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application\u0027s backend database causing unauthorized read access to application data. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application\u0027s backend database causing unauthorized read access to application data. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:26:43.251Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44284", "datePublished": "2023-12-14T15:26:43.251Z", "dateReserved": "2023-09-28T09:25:45.714Z", "dateUpdated": "2024-11-21T16:20:17.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44279 (GCVE-0-2023-44279)
Vulnerability from cvelistv5
Published
2023-12-14 15:22
Modified
2024-10-01 14:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerprotect_data_domain", "vendor": "dell", "versions": [ { "lessThan": "7.13.0.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:dell:powerprotect_data_domain:-:*:*:*:lts:*:*:*" ], "defaultStatus": "unknown", "product": "powerprotect_data_domain", "vendor": "dell", "versions": [ { "status": "affected", "version": "7.7.5.25" }, { "status": "affected", "version": "7.10.1.15" }, { "status": "affected", "version": "6.2.1.110" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-44279", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-26T17:07:53.377116Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T14:44:19.118Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Rushank Shetty and Ryan Kane (Security Researchers at Northwestern Mutual) for reporting this issue. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker\u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:22:27.116Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44279", "datePublished": "2023-12-14T15:22:27.116Z", "dateReserved": "2023-09-28T09:25:45.713Z", "dateUpdated": "2024-10-01T14:44:19.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45102 (GCVE-0-2022-45102)
Vulnerability from cvelistv5
Published
2023-02-01 05:11
Modified
2025-03-26 20:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-644 - Improper Neutralization of HTTP Headers for Scripting Syntax
Summary
Dell EMC Data Protection Central, versions 19.1 through 19.7, contains a Host Header Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary \u2018Host\u2019 header values to poison a web cache or trigger redirections.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Data Protection Central |
Version: 19.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:01:31.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206329/dsa-2022-348-dell-emc-data-protection-central-security-update-for-proprietary-code-vulnerability" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45102", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-26T20:06:10.109333Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-26T20:06:17.266Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Data Protection Central", "vendor": "Dell", "versions": [ { "lessThanOrEqual": "19.7", "status": "affected", "version": "19.1", "versionType": "custom" } ] } ], "datePublic": "2022-12-15T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cdiv\u003e\u003cdiv\u003eDell EMC Data Protection Central, versions 19.1 through 19.7, contains a Host Header Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary \\u2018Host\\u2019 header values to poison a web cache or trigger redirections.\u003c/div\u003e\u003c/div\u003e\n\n" } ], "value": "\nDell EMC Data Protection Central, versions 19.1 through 19.7, contains a Host Header Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary \\u2018Host\\u2019 header values to poison a web cache or trigger redirections.\n\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-644", "description": "CWE-644: Improper Neutralization of HTTP Headers for Scripting Syntax", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T05:11:30.285Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206329/dsa-2022-348-dell-emc-data-protection-central-security-update-for-proprietary-code-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-45102", "datePublished": "2023-02-01T05:11:30.285Z", "dateReserved": "2022-11-09T15:48:33.040Z", "dateUpdated": "2025-03-26T20:06:17.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44278 (GCVE-0-2023-44278)
Vulnerability from cvelistv5
Published
2023-12-14 15:17
Modified
2024-08-02 19:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 " } ] } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:17:01.213Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44278", "datePublished": "2023-12-14T15:17:01.213Z", "dateReserved": "2023-09-28T09:25:45.713Z", "dateUpdated": "2024-08-02T19:59:51.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-48667 (GCVE-0-2023-48667)
Vulnerability from cvelistv5
Published
2023-12-14 15:40
Modified
2024-08-02 21:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:37:54.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "datePublic": "2023-12-14T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:40:07.760Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-48667", "datePublished": "2023-12-14T15:40:07.760Z", "dateReserved": "2023-11-17T06:14:57.042Z", "dateUpdated": "2024-08-02T21:37:54.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44286 (GCVE-0-2023-44286)
Vulnerability from cvelistv5
Published
2023-12-14 15:35
Modified
2024-08-02 19:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user's DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110ersions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:52.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD ", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110ersions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Jakub Brzozowski (redfr0g), Franciszek Kalinowski, and Stanis\u0142aw Koza from STM Cyber for reporting these issues. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user\u0027s DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user\u0027s DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:35:32.521Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44286", "datePublished": "2023-12-14T15:35:32.521Z", "dateReserved": "2023-09-28T09:25:45.714Z", "dateUpdated": "2024-08-02T19:59:52.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44285 (GCVE-0-2023-44285)
Vulnerability from cvelistv5
Published
2023-12-14 15:31
Modified
2024-08-02 19:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1220 - Insufficient Granularity of Access Control
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Jens Kr\u00fcger from SAP for reporting this issue. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1220", "description": "CWE-1220: Insufficient Granularity of Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:31:14.009Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44285", "datePublished": "2023-12-14T15:31:14.009Z", "dateReserved": "2023-09-28T09:25:45.714Z", "dateUpdated": "2024-08-02T19:59:51.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:32
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la Interfaz de L\u00ednea de Comandos (CLI) del administrador. Un atacante remoto con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n para eludir las restricciones de seguridad. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema." } ], "id": "CVE-2023-48667", "lastModified": "2024-11-21T08:32:13.730", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:50.040", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.\n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de control de acceso inadecuado. Un usuario malintencionado local con privilegios bajos podr\u00eda explotar esta vulnerabilidad y provocar una escalada de privilegios." } ], "id": "CVE-2023-44285", "lastModified": "2024-11-21T08:25:35.383", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:47.617", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1220" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-29 16:15
Modified
2025-02-04 17:17
Severity ?
7.6 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Dell Data Protection Advisor, version(s) 19.9, contain(s) an Inadequate Encryption Strength vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | data_protection_advisor | * | |
dell | dp4400_firmware | * | |
dell | dp4400 | - | |
dell | dp5900_firmware | * | |
dell | dp5900 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:data_protection_advisor:*:*:*:*:*:*:*:*", "matchCriteriaId": "698627DD-7450-4E31-B2E3-3E3AFE89C77B", "versionEndExcluding": "19.9", "versionStartIncluding": "19.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dp4400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0189342-015B-4936-8657-EC1A15B102BD", "versionEndIncluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dp5900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C393BA0-2088-497A-827F-104769043D5E", "versionEndIncluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Data Protection Advisor, version(s) 19.9, contain(s) an Inadequate Encryption Strength vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service." }, { "lang": "es", "value": "Dell Data Protection Advisor, versi\u00f3n(es) 19.9, contiene una vulnerabilidad de fuerza de cifrado inadecuada. Un atacante con pocos privilegios y acceso remoto podr\u00eda explotar esta vulnerabilidad y provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2024-28974", "lastModified": "2025-02-04T17:17:15.437", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-29T16:15:09.550", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000225088/dsa-2024-192-security-update-for-data-protection-advisor-and-powerprotect-dp-series-appliance-idpa-for-multiple-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000225088/dsa-2024-192-security-update-for-data-protection-advisor-and-powerprotect-dp-series-appliance-idpa-for-multiple-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "security_alert@emc.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 15:15
Modified
2024-11-21 08:25
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la Interfaz de L\u00ednea de Comandos (CLI). Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n, con los privilegios de la aplicaci\u00f3n vulnerable. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema." } ], "id": "CVE-2023-44277", "lastModified": "2024-11-21T08:25:34.403", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T15:15:08.093", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-01 06:15
Modified
2024-11-21 07:28
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Dell EMC Data Protection Central, versions 19.1 through 19.7, contains a Host Header Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary \u2018Host\u2019 header values to poison a web cache or trigger redirections.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | emc_data_protection_central | * | |
dell | dp4400_firmware | * | |
dell | dp4400 | - | |
dell | dp5900_firmware | * | |
dell | dp5900 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:emc_data_protection_central:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC7A28EE-CDD7-4B20-B8A7-F1FBCDC02861", "versionEndExcluding": "19.8", "versionStartIncluding": "19.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dp4400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A9F4B46-79CF-442A-8320-79663FE92B0B", "versionEndIncluding": "2.7", "versionStartIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dp5900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "565B45DE-612B-4655-8024-66C800639A27", "versionEndIncluding": "2.7", "versionStartIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell EMC Data Protection Central, versions 19.1 through 19.7, contains a Host Header Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary \\u2018Host\\u2019 header values to poison a web cache or trigger redirections.\n\n\n\n\n\n" } ], "id": "CVE-2022-45102", "lastModified": "2024-11-21T07:28:47.180", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-01T06:15:09.123", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206329/dsa-2022-348-dell-emc-data-protection-central-security-update-for-proprietary-code-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206329/dsa-2022-348-dell-emc-data-protection-central-security-update-for-proprietary-code-vulnerability" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-644" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-116" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user's DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user\u0027s DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de Cross-Site Scripting basada en DOM. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la inyecci\u00f3n de c\u00f3digo HTML o JavaScript malicioso en el entorno DOM del usuario v\u00edctima en el navegador. La explotaci\u00f3n puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n, el robo de sesiones o la falsificaci\u00f3n de solicitudes por parte del cliente." } ], "id": "CVE-2023-44286", "lastModified": "2024-11-21T08:25:35.523", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:48.200", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de path traversal. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad para obtener acceso de lectura y escritura no autorizado a los archivos del sistema operativo almacenados en el sistema de archivos del servidor, con los privilegios de la aplicaci\u00f3n en ejecuci\u00f3n." } ], "id": "CVE-2023-44278", "lastModified": "2024-11-21T08:25:34.557", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:45.490", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized read access to application data.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application\u0027s backend database causing unauthorized read access to application data. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n SQL. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de ciertos comandos SQL en la base de datos backend de la aplicaci\u00f3n, lo que provocar\u00eda un acceso de lectura no autorizado a los datos de la aplicaci\u00f3n." } ], "id": "CVE-2023-44284", "lastModified": "2024-11-21T08:25:35.263", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:46.880", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker\n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la Interfaz de L\u00ednea de Comandos (CLI) del administrador. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad para eludir las restricciones de seguridad. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema" } ], "id": "CVE-2023-44279", "lastModified": "2024-11-21T08:25:34.707", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:46.017", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }