Vulnerabilites related to dell - emc_data_domain_os
CVE-2016-0912 (GCVE-0-2016-0912)
Vulnerability from cvelistv5
Published
2016-06-19 20:00
Modified
2024-08-05 22:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 allows remote authenticated users to bypass intended password-change restrictions by leveraging access to (1) a different account with the same role as a target account or (2) an account's session at an unattended workstation.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:38:41.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1036079", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036079" }, { "name": "20160610 ESA-2016-062: EMC Data Domain Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://seclists.org/bugtraq/2016/Jun/50" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 allows remote authenticated users to bypass intended password-change restrictions by leveraging access to (1) a different account with the same role as a target account or (2) an account\u0027s session at an unattended workstation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-09T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "1036079", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036079" }, { "name": "20160610 ESA-2016-062: EMC Data Domain Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://seclists.org/bugtraq/2016/Jun/50" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-0912", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 allows remote authenticated users to bypass intended password-change restrictions by leveraging access to (1) a different account with the same role as a target account or (2) an account\u0027s session at an unattended workstation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1036079", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036079" }, { "name": "20160610 ESA-2016-062: EMC Data Domain Multiple Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://seclists.org/bugtraq/2016/Jun/50" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-0912", "datePublished": "2016-06-19T20:00:00", "dateReserved": "2015-12-17T00:00:00", "dateUpdated": "2024-08-05T22:38:41.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44286 (GCVE-0-2023-44286)
Vulnerability from cvelistv5
Published
2023-12-14 15:35
Modified
2024-08-02 19:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user's DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110ersions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:52.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD ", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110ersions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Jakub Brzozowski (redfr0g), Franciszek Kalinowski, and Stanis\u0142aw Koza from STM Cyber for reporting these issues. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user\u0027s DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user\u0027s DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:35:32.521Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44286", "datePublished": "2023-12-14T15:35:32.521Z", "dateReserved": "2023-09-28T09:25:45.714Z", "dateUpdated": "2024-08-02T19:59:52.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44285 (GCVE-0-2023-44285)
Vulnerability from cvelistv5
Published
2023-12-14 15:31
Modified
2024-08-02 19:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1220 - Insufficient Granularity of Access Control
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Jens Kr\u00fcger from SAP for reporting this issue. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1220", "description": "CWE-1220: Insufficient Granularity of Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:31:14.009Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44285", "datePublished": "2023-12-14T15:31:14.009Z", "dateReserved": "2023-09-28T09:25:45.714Z", "dateUpdated": "2024-08-02T19:59:51.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44284 (GCVE-0-2023-44284)
Vulnerability from cvelistv5
Published
2023-12-14 15:26
Modified
2024-11-21 16:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized read access to application data.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44284", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T16:19:54.936040Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T16:20:17.129Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Jakub Brzozowski (redfr0g), Franciszek Kalinowski, and Stanis\u0142aw Koza from STM Cyber for reporting these issues. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application\u0027s backend database causing unauthorized read access to application data. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application\u0027s backend database causing unauthorized read access to application data. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:26:43.251Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44284", "datePublished": "2023-12-14T15:26:43.251Z", "dateReserved": "2023-09-28T09:25:45.714Z", "dateUpdated": "2024-11-21T16:20:17.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44278 (GCVE-0-2023-44278)
Vulnerability from cvelistv5
Published
2023-12-14 15:17
Modified
2024-08-02 19:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 " } ] } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:17:01.213Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44278", "datePublished": "2023-12-14T15:17:01.213Z", "dateReserved": "2023-09-28T09:25:45.713Z", "dateUpdated": "2024-08-02T19:59:51.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-48667 (GCVE-0-2023-48667)
Vulnerability from cvelistv5
Published
2023-12-14 15:40
Modified
2024-08-02 21:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:37:54.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "datePublic": "2023-12-14T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:40:07.760Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-48667", "datePublished": "2023-12-14T15:40:07.760Z", "dateReserved": "2023-11-17T06:14:57.042Z", "dateUpdated": "2024-08-02T21:37:54.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-23692 (GCVE-0-2023-23692)
Vulnerability from cvelistv5
Published
2023-02-01 12:30
Modified
2025-03-26 18:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Dell EMC prior to version DDOS 7.9 contain(s) an OS command injection Vulnerability. An authenticated non admin attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Data Domain |
Version: 0 < Version: 0 < Version: 0 < 6.2.1.80 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:33.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000201296/dsa-2022-187-dell-technologies-powerprotect-data-domain-security-update-for-multiple-third-party-component-vulnerabilities" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-23692", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-26T16:14:56.957311Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-26T18:42:00.273Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Data Domain", "vendor": "Dell", "versions": [ { "lessThanOrEqual": "7.0 to 7.8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "LTS 7.7.1 to 7.7.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "6.2.1.80", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2022-07-07T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell EMC prior to version DDOS 7.9 contain(s) an OS command injection Vulnerability. An authenticated non admin attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application.\u003c/span\u003e\n\n" } ], "value": "\nDell EMC prior to version DDOS 7.9 contain(s) an OS command injection Vulnerability. An authenticated non admin attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T12:30:12.354Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000201296/dsa-2022-187-dell-technologies-powerprotect-data-domain-security-update-for-multiple-third-party-component-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-23692", "datePublished": "2023-02-01T12:30:12.354Z", "dateReserved": "2023-01-17T05:22:17.394Z", "dateUpdated": "2025-03-26T18:42:00.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4983 (GCVE-0-2017-4983)
Vulnerability from cvelistv5
Published
2017-05-04 14:00
Modified
2024-08-05 14:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege Escalation Vulnerability
Summary
EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0 is affected by a privilege escalation vulnerability that may potentially be exploited by attackers to compromise the affected system.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0 |
Version: EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "98047", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98047" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/540517/30/0/threaded" }, { "name": "1038404", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038404" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0" } ] } ], "datePublic": "2017-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0 is affected by a privilege escalation vulnerability that may potentially be exploited by attackers to compromise the affected system." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Escalation Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-07T09:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "98047", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98047" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.securityfocus.com/archive/1/540517/30/0/threaded" }, { "name": "1038404", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038404" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2017-4983", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0", "version": { "version_data": [ { "version_value": "EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0 is affected by a privilege escalation vulnerability that may potentially be exploited by attackers to compromise the affected system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Escalation Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "98047", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98047" }, { "name": "http://www.securityfocus.com/archive/1/540517/30/0/threaded", "refsource": "CONFIRM", "url": "http://www.securityfocus.com/archive/1/540517/30/0/threaded" }, { "name": "1038404", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038404" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2017-4983", "datePublished": "2017-05-04T14:00:00", "dateReserved": "2016-12-29T00:00:00", "dateUpdated": "2024-08-05T14:47:43.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44277 (GCVE-0-2023-44277)
Vulnerability from cvelistv5
Published
2023-12-14 15:05
Modified
2024-08-02 19:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:52.006Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 " } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "ell Technologies would like to thank Jakub Brzozowski (redfr0g), Franciszek Kalinowski, and Stanis\u0142aw Koza from STM Cyber for reporting these issues. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:05:01.367Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44277", "datePublished": "2023-12-14T15:05:01.367Z", "dateReserved": "2023-09-28T09:25:45.713Z", "dateUpdated": "2024-08-02T19:59:52.006Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8216 (GCVE-0-2016-8216)
Vulnerability from cvelistv5
Published
2017-02-03 07:24
Modified
2024-08-06 02:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Command Injection Vulnerability
Summary
EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10 has a command injection vulnerability that could potentially be exploited by malicious users to compromise the affected system.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | EMC Data Domain DD OS EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10 |
Version: EMC Data Domain DD OS EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:13:21.835Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/540059/30/0/threaded" }, { "name": "1037728", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037728" }, { "name": "95829", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95829" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMC Data Domain DD OS EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMC Data Domain DD OS EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10" } ] } ], "datePublic": "2017-02-03T00:00:00", "descriptions": [ { "lang": "en", "value": "EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10 has a command injection vulnerability that could potentially be exploited by malicious users to compromise the affected system." } ], "problemTypes": [ { "descriptions": [ { "description": "Command Injection Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-10T21:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.securityfocus.com/archive/1/540059/30/0/threaded" }, { "name": "1037728", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037728" }, { "name": "95829", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/95829" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-8216", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMC Data Domain DD OS EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10", "version": { "version_data": [ { "version_value": "EMC Data Domain DD OS EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10 has a command injection vulnerability that could potentially be exploited by malicious users to compromise the affected system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Command Injection Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.securityfocus.com/archive/1/540059/30/0/threaded", "refsource": "CONFIRM", "url": "http://www.securityfocus.com/archive/1/540059/30/0/threaded" }, { "name": "1037728", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037728" }, { "name": "95829", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95829" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-8216", "datePublished": "2017-02-03T07:24:00", "dateReserved": "2016-09-13T00:00:00", "dateUpdated": "2024-08-06T02:13:21.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-0911 (GCVE-0-2016-0911)
Vulnerability from cvelistv5
Published
2016-06-19 20:00
Modified
2024-08-05 22:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 has a default no_root_squash option for NFS exports, which makes it easier for remote attackers to obtain filesystem access by leveraging client root privileges.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:38:40.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1036079", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036079" }, { "name": "20160610 ESA-2016-062: EMC Data Domain Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://seclists.org/bugtraq/2016/Jun/50" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 has a default no_root_squash option for NFS exports, which makes it easier for remote attackers to obtain filesystem access by leveraging client root privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-09T16:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "1036079", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036079" }, { "name": "20160610 ESA-2016-062: EMC Data Domain Multiple Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://seclists.org/bugtraq/2016/Jun/50" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-0911", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 has a default no_root_squash option for NFS exports, which makes it easier for remote attackers to obtain filesystem access by leveraging client root privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1036079", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036079" }, { "name": "20160610 ESA-2016-062: EMC Data Domain Multiple Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://seclists.org/bugtraq/2016/Jun/50" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-0911", "datePublished": "2016-06-19T20:00:00", "dateReserved": "2015-12-17T00:00:00", "dateUpdated": "2024-08-05T22:38:40.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44279 (GCVE-0-2023-44279)
Vulnerability from cvelistv5
Published
2023-12-14 15:22
Modified
2024-10-01 14:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerprotect_data_domain", "vendor": "dell", "versions": [ { "lessThan": "7.13.0.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:dell:powerprotect_data_domain:-:*:*:*:lts:*:*:*" ], "defaultStatus": "unknown", "product": "powerprotect_data_domain", "vendor": "dell", "versions": [ { "status": "affected", "version": "7.7.5.25" }, { "status": "affected", "version": "7.10.1.15" }, { "status": "affected", "version": "6.2.1.110" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-44279", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-26T17:07:53.377116Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T14:44:19.118Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Rushank Shetty and Ryan Kane (Security Researchers at Northwestern Mutual) for reporting this issue. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker\u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:22:27.116Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44279", "datePublished": "2023-12-14T15:22:27.116Z", "dateReserved": "2023-09-28T09:25:45.713Z", "dateUpdated": "2024-10-01T14:44:19.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized read access to application data.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application\u0027s backend database causing unauthorized read access to application data. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n SQL. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de ciertos comandos SQL en la base de datos backend de la aplicaci\u00f3n, lo que provocar\u00eda un acceso de lectura no autorizado a los datos de la aplicaci\u00f3n." } ], "id": "CVE-2023-44284", "lastModified": "2024-11-21T08:25:35.263", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:46.880", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:32
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la Interfaz de L\u00ednea de Comandos (CLI) del administrador. Un atacante remoto con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n para eludir las restricciones de seguridad. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema." } ], "id": "CVE-2023-48667", "lastModified": "2024-11-21T08:32:13.730", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:50.040", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-03 07:59
Modified
2025-04-20 01:37
Severity ?
Summary
EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10 has a command injection vulnerability that could potentially be exploited by malicious users to compromise the affected system.
References
▶ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://www.securityfocus.com/archive/1/540059/30/0/threaded | Mailing List, Third Party Advisory, VDB Entry | |
security_alert@emc.com | http://www.securityfocus.com/bid/95829 | Third Party Advisory, VDB Entry | |
security_alert@emc.com | http://www.securitytracker.com/id/1037728 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/540059/30/0/threaded | Mailing List, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/95829 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037728 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | emc_data_domain_os | 5.4 | |
dell | emc_data_domain_os | 5.5 | |
dell | emc_data_domain_os | 5.6 | |
dell | emc_data_domain_os | 5.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F1B32F0-314B-4461-A25C-B44D05A58A8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "04030715-63F7-4DD1-9513-2E131BD9B13D", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "846D0C1D-F93E-4685-9DFA-90FCD360F41B", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "2E70A9F7-A09A-4E69-ABE7-A624CC00D1BB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 5.5.5.0, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 5.6.2.0, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 5.7.2.10 has a command injection vulnerability that could potentially be exploited by malicious users to compromise the affected system." }, { "lang": "es", "value": "EMC Data Domain OS (DD OS) 5.4 todas las versiones, familia EMC Data Domain OS (DD OS) 5.5 todas las versiones anteriores a 5.5.5.0, familia EMC Data Domain OS (DD OS) 5.6 todas las versiones anteriores a 5.6.2.0, familia EMC Data Domain OS (DD OS) 5.7 todas las versiones anteriores a 5.7.2.10 tienen una vulnerabilidad de inyecci\u00f3n de comandos que podr\u00eda ser explotada por usuarios malintencionados para comprometer el sistema afectado." } ], "id": "CVE-2016-8216", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-03T07:59:00.390", "references": [ { "source": "security_alert@emc.com", "tags": [ "Mailing List", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540059/30/0/threaded" }, { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95829" }, { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540059/30/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95829" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037728" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user's DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user\u0027s DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de Cross-Site Scripting basada en DOM. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la inyecci\u00f3n de c\u00f3digo HTML o JavaScript malicioso en el entorno DOM del usuario v\u00edctima en el navegador. La explotaci\u00f3n puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n, el robo de sesiones o la falsificaci\u00f3n de solicitudes por parte del cliente." } ], "id": "CVE-2023-44286", "lastModified": "2024-11-21T08:25:35.523", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:48.200", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-04 14:29
Modified
2025-04-20 01:37
Severity ?
Summary
EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0 is affected by a privilege escalation vulnerability that may potentially be exploited by attackers to compromise the affected system.
References
▶ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://www.securityfocus.com/archive/1/540517/30/0/threaded | Third Party Advisory, VDB Entry | |
security_alert@emc.com | http://www.securityfocus.com/bid/98047 | Third Party Advisory, VDB Entry | |
security_alert@emc.com | http://www.securitytracker.com/id/1038404 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/540517/30/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/98047 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038404 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | emc_data_domain_os | 5.2 | |
dell | emc_data_domain_os | 5.4 | |
dell | emc_data_domain_os | 5.5 | |
dell | emc_data_domain_os | 5.6 | |
dell | emc_data_domain_os | 5.7 | |
dell | emc_data_domain_os | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E2164BB5-BB03-40AC-8516-D6B1F391A14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F1B32F0-314B-4461-A25C-B44D05A58A8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "04030715-63F7-4DD1-9513-2E131BD9B13D", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "846D0C1D-F93E-4685-9DFA-90FCD360F41B", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "2E70A9F7-A09A-4E69-ABE7-A624CC00D1BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "22581424-17D9-4520-BB2D-BD083DE6B964", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "EMC Data Domain OS 5.2 through 5.7 before 5.7.3.0 and 6.0 before 6.0.1.0 is affected by a privilege escalation vulnerability that may potentially be exploited by attackers to compromise the affected system." }, { "lang": "es", "value": "El sistema operativo EMC Data Domain entre las versi\u00f3nes 5.2 y 5.7 y las anteriores a la 5.7.3.0,y entre la versi\u00f3n 6.0 y la 6.0.1.0, se ve afectado por una vulnerabilidad de escalamiento de privilegios que puede ser explotada por los atacantes para comprometer el sistema afectado." } ], "id": "CVE-2017-4983", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-04T14:29:00.153", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540517/30/0/threaded" }, { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98047" }, { "source": "security_alert@emc.com", "url": "http://www.securitytracker.com/id/1038404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540517/30/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038404" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-01 13:15
Modified
2024-11-21 07:46
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Dell EMC prior to version DDOS 7.9 contain(s) an OS command injection Vulnerability. An authenticated non admin attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | emc_data_domain_os | * | |
dell | emc_data_domain_os | * | |
dell | emc_data_domain_os | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CE47954-0C0D-43F2-AB58-C72D87E5CB96", "versionEndExcluding": "6.2.1.90", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:-:*:*:*", "matchCriteriaId": "4A9CCC71-0BE1-477F-A8DD-70318B2301C7", "versionEndExcluding": "7.9.0.0", "versionStartIncluding": "7.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts:*:*:*", "matchCriteriaId": "396BB44C-76A2-465E-816D-EB6CC51D3641", "versionEndExcluding": "7.7.3", "versionStartIncluding": "7.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell EMC prior to version DDOS 7.9 contain(s) an OS command injection Vulnerability. An authenticated non admin attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application.\n\n" } ], "id": "CVE-2023-23692", "lastModified": "2024-11-21T07:46:40.377", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-01T13:15:09.640", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000201296/dsa-2022-187-dell-technologies-powerprotect-data-domain-security-update-for-multiple-third-party-component-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000201296/dsa-2022-187-dell-technologies-powerprotect-data-domain-security-update-for-multiple-third-party-component-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker\n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la Interfaz de L\u00ednea de Comandos (CLI) del administrador. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad para eludir las restricciones de seguridad. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema" } ], "id": "CVE-2023-44279", "lastModified": "2024-11-21T08:25:34.707", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:46.017", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.\n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de control de acceso inadecuado. Un usuario malintencionado local con privilegios bajos podr\u00eda explotar esta vulnerabilidad y provocar una escalada de privilegios." } ], "id": "CVE-2023-44285", "lastModified": "2024-11-21T08:25:35.383", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:47.617", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1220" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-06-19 20:59
Modified
2025-04-12 10:46
Severity ?
Summary
EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 has a default no_root_squash option for NFS exports, which makes it easier for remote attackers to obtain filesystem access by leveraging client root privileges.
References
▶ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://seclists.org/bugtraq/2016/Jun/50 | Third Party Advisory | |
security_alert@emc.com | http://www.securitytracker.com/id/1036079 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/bugtraq/2016/Jun/50 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036079 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | emc_data_domain_os | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AA30DB0-6F22-4A20-B519-A8F4641104B5", "versionEndIncluding": "5.7.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 has a default no_root_squash option for NFS exports, which makes it easier for remote attackers to obtain filesystem access by leveraging client root privileges." }, { "lang": "es", "value": "EMC Data Domain SO 5.4 hasta la versi\u00f3n 5.7 en versiones anteriores a 5.7.2.0 tiene una opci\u00f3n no_root_squash por defecto para exportaciones NFS, lo que facilita a atacantes remotos obtener acceso a archivos del sistema aprovechando privilegios root del cliente." } ], "id": "CVE-2016-0911", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-19T20:59:03.097", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/bugtraq/2016/Jun/50" }, { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/bugtraq/2016/Jun/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036079" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 15:15
Modified
2024-11-21 08:25
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la Interfaz de L\u00ednea de Comandos (CLI). Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n, con los privilegios de la aplicaci\u00f3n vulnerable. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema." } ], "id": "CVE-2023-44277", "lastModified": "2024-11-21T08:25:34.403", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T15:15:08.093", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de path traversal. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad para obtener acceso de lectura y escritura no autorizado a los archivos del sistema operativo almacenados en el sistema de archivos del servidor, con los privilegios de la aplicaci\u00f3n en ejecuci\u00f3n." } ], "id": "CVE-2023-44278", "lastModified": "2024-11-21T08:25:34.557", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:45.490", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-06-19 20:59
Modified
2025-04-12 10:46
Severity ?
Summary
EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 allows remote authenticated users to bypass intended password-change restrictions by leveraging access to (1) a different account with the same role as a target account or (2) an account's session at an unattended workstation.
References
▶ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | http://seclists.org/bugtraq/2016/Jun/50 | Third Party Advisory | |
security_alert@emc.com | http://www.securitytracker.com/id/1036079 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/bugtraq/2016/Jun/50 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036079 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | emc_data_domain_os | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AA30DB0-6F22-4A20-B519-A8F4641104B5", "versionEndIncluding": "5.7.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 allows remote authenticated users to bypass intended password-change restrictions by leveraging access to (1) a different account with the same role as a target account or (2) an account\u0027s session at an unattended workstation." }, { "lang": "es", "value": "EMC Data Domain SO 5.4 hasta la versi\u00f3n 5.7 en versiones anteriores a 5.7.2.0 permite a usuarios remotos autenticados eludir restricciones destinadas al cambio de contrase\u00f1a aprovechando el acceso a (1) una cuenta diferente con el mismo rol como una cuenta de destino o (2) la sesi\u00f3n de una cuenta en una estaci\u00f3n de trabajo sin vigilancia." } ], "id": "CVE-2016-0912", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-19T20:59:04.033", "references": [ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/bugtraq/2016/Jun/50" }, { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/bugtraq/2016/Jun/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036079" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }