Vulnerabilites related to dell - powerprotect_data_domain
cve-2023-44278
Vulnerability from cvelistv5
Published
2023-12-14 15:17
Modified
2024-08-02 19:59
Severity ?
EPSS score ?
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 " } ] } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:17:01.213Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44278", "datePublished": "2023-12-14T15:17:01.213Z", "dateReserved": "2023-09-28T09:25:45.713Z", "dateUpdated": "2024-08-02T19:59:51.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44286
Vulnerability from cvelistv5
Published
2023-12-14 15:35
Modified
2024-08-02 19:59
Severity ?
EPSS score ?
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user's DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110ersions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:52.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD ", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110ersions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Jakub Brzozowski (redfr0g), Franciszek Kalinowski, and Stanis\u0142aw Koza from STM Cyber for reporting these issues. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user\u0027s DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user\u0027s DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:35:32.521Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44286", "datePublished": "2023-12-14T15:35:32.521Z", "dateReserved": "2023-09-28T09:25:45.714Z", "dateUpdated": "2024-08-02T19:59:52.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44279
Vulnerability from cvelistv5
Published
2023-12-14 15:22
Modified
2024-10-01 14:44
Severity ?
EPSS score ?
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerprotect_data_domain", "vendor": "dell", "versions": [ { "lessThan": "7.13.0.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:dell:powerprotect_data_domain:-:*:*:*:lts:*:*:*" ], "defaultStatus": "unknown", "product": "powerprotect_data_domain", "vendor": "dell", "versions": [ { "status": "affected", "version": "7.7.5.25" }, { "status": "affected", "version": "7.10.1.15" }, { "status": "affected", "version": "6.2.1.110" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-44279", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-26T17:07:53.377116Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T14:44:19.118Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Rushank Shetty and Ryan Kane (Security Researchers at Northwestern Mutual) for reporting this issue. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker\u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:22:27.116Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44279", "datePublished": "2023-12-14T15:22:27.116Z", "dateReserved": "2023-09-28T09:25:45.713Z", "dateUpdated": "2024-10-01T14:44:19.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44277
Vulnerability from cvelistv5
Published
2023-12-14 15:05
Modified
2024-08-02 19:59
Severity ?
EPSS score ?
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:52.006Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 " } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "ell Technologies would like to thank Jakub Brzozowski (redfr0g), Franciszek Kalinowski, and Stanis\u0142aw Koza from STM Cyber for reporting these issues. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:05:01.367Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44277", "datePublished": "2023-12-14T15:05:01.367Z", "dateReserved": "2023-09-28T09:25:45.713Z", "dateUpdated": "2024-08-02T19:59:52.006Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48667
Vulnerability from cvelistv5
Published
2023-12-14 15:40
Modified
2024-08-02 21:37
Severity ?
EPSS score ?
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:37:54.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "datePublic": "2023-12-14T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:40:07.760Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-48667", "datePublished": "2023-12-14T15:40:07.760Z", "dateReserved": "2023-11-17T06:14:57.042Z", "dateUpdated": "2024-08-02T21:37:54.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44285
Vulnerability from cvelistv5
Published
2023-12-14 15:31
Modified
2024-08-02 19:59
Severity ?
EPSS score ?
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Jens Kr\u00fcger from SAP for reporting this issue. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1220", "description": "CWE-1220: Insufficient Granularity of Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:31:14.009Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44285", "datePublished": "2023-12-14T15:31:14.009Z", "dateReserved": "2023-09-28T09:25:45.714Z", "dateUpdated": "2024-08-02T19:59:51.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44284
Vulnerability from cvelistv5
Published
2023-12-14 15:26
Modified
2024-11-21 16:20
Severity ?
EPSS score ?
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized read access to application data.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | PowerProtect DD |
Version: Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44284", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T16:19:54.936040Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T16:20:17.129Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerProtect DD", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dell Technologies would like to thank Jakub Brzozowski (redfr0g), Franciszek Kalinowski, and Stanis\u0142aw Koza from STM Cyber for reporting these issues. " } ], "datePublic": "2023-12-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application\u0027s backend database causing unauthorized read access to application data. \u003c/span\u003e\n\n" } ], "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application\u0027s backend database causing unauthorized read access to application data. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T15:26:43.251Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-44284", "datePublished": "2023-12-14T15:26:43.251Z", "dateReserved": "2023-09-28T09:25:45.714Z", "dateUpdated": "2024-11-21T16:20:17.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.\n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de control de acceso inadecuado. Un usuario malintencionado local con privilegios bajos podr\u00eda explotar esta vulnerabilidad y provocar una escalada de privilegios." } ], "id": "CVE-2023-44285", "lastModified": "2024-11-21T08:25:35.383", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:47.617", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1220" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:32
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la Interfaz de L\u00ednea de Comandos (CLI) del administrador. Un atacante remoto con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n para eludir las restricciones de seguridad. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema." } ], "id": "CVE-2023-48667", "lastModified": "2024-11-21T08:32:13.730", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:50.040", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized read access to application data.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an SQL Injection vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application\u0027s backend database causing unauthorized read access to application data. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n SQL. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de ciertos comandos SQL en la base de datos backend de la aplicaci\u00f3n, lo que provocar\u00eda un acceso de lectura no autorizado a los datos de la aplicaci\u00f3n." } ], "id": "CVE-2023-44284", "lastModified": "2024-11-21T08:25:35.263", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:46.880", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker\n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la Interfaz de L\u00ednea de Comandos (CLI) del administrador. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad para eludir las restricciones de seguridad. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema" } ], "id": "CVE-2023-44279", "lastModified": "2024-11-21T08:25:34.707", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:46.017", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 15:15
Modified
2024-11-21 08:25
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in the CLI. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application\u0027s underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la Interfaz de L\u00ednea de Comandos (CLI). Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n, con los privilegios de la aplicaci\u00f3n vulnerable. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema." } ], "id": "CVE-2023-44277", "lastModified": "2024-11-21T08:25:34.403", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T15:15:08.093", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user's DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user\u0027s DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de Cross-Site Scripting basada en DOM. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la inyecci\u00f3n de c\u00f3digo HTML o JavaScript malicioso en el entorno DOM del usuario v\u00edctima en el navegador. La explotaci\u00f3n puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n, el robo de sesiones o la falsificaci\u00f3n de solicitudes por parte del cliente." } ], "id": "CVE-2023-44286", "lastModified": "2024-11-21T08:25:35.523", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:48.200", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 16:15
Modified
2024-11-21 08:25
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:powerprotect_data_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECDF606-7EAF-4846-AE1F-4DDD6E4A0F9E", "versionEndExcluding": "2.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dp4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4886295D-2A46-4AD3-8DC4-0FA212640C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dp5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3E6F9-70B2-4347-A58B-0868395D6193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "69E4E017-55A9-4E0F-A7EF-C4100B8AB1D7", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:apex_protection_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "86944363-EB13-4C55-9B54-6416B7B6D8E1", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "E55E7C34-C4A4-4E91-A1A8-CEADB6423BB1", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain:*:*:*:*:virtual:*:*:*", "matchCriteriaId": "F0C53AB7-8C4F-4B92-A229-363D39A6CEDC", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "9540FB1D-8ACB-4697-9F64-0CC6EB81706E", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F4CE859-62A1-4DB5-B986-FC2943D66A5A", "versionEndExcluding": "7.13.0.10", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B175C-0AF1-42C1-9F84-47BC260C3819", "versionEndExcluding": "6.2.1.110", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD632A5-142D-4FA3-85FE-EAC079EFA8D8", "versionEndExcluding": "7.12.0.0", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "BADA4FAB-B4E2-43D8-8BE6-960B333D8CB8", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:emc_data_domain_os:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "585FCF80-A59C-4070-9D7D-8B707983A6ED", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "matchCriteriaId": "9D0424A4-BA46-4CF3-8704-CC894EF2B194", "versionEndExcluding": "7.7.5.25", "versionStartIncluding": "7.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*", "matchCriteriaId": "EDE4E1BC-05DC-4B31-B0C1-97DBA2BE9CE9", "versionEndExcluding": "7.10.1.15", "versionStartIncluding": "7.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application. \n\n" }, { "lang": "es", "value": "Dell PowerProtect DD, versiones anteriores a 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contienen una vulnerabilidad de path traversal. Un atacante local con privilegios elevados podr\u00eda explotar esta vulnerabilidad para obtener acceso de lectura y escritura no autorizado a los archivos del sistema operativo almacenados en el sistema de archivos del servidor, con los privilegios de la aplicaci\u00f3n en ejecuci\u00f3n." } ], "id": "CVE-2023-44278", "lastModified": "2024-11-21T08:25:34.557", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T16:15:45.490", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }