var-201811-0038
Vulnerability from variot

Dell EMC RecoverPoint versions prior to 5.1.2.1 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an uncontrolled resource consumption vulnerability. A malicious boxmgmt user may potentially be able to consume large amount of CPU bandwidth to make the system slow or to determine the existence of any system file via Boxmgmt CLI. Dell EMC RecoverPoint are prone to an information-disclosure vulnerability and a denial-of-service vulnerability. Successfully exploiting these issues may allow an attacker to obtain sensitive information or to consume excessive resources, resulting in a denial of service. The former is a set of disaster recovery and data protection software, and the latter is a set of disaster recovery solutions for VMware environments.

Link to remedies:

Customers can download software from: https://support.emc.com/search/?text=RecoverPoint&searchLang=en_US&facetResource=DOWN

Credits:

Dell EMC would like to thank Paul Taylor (@bao7uo) for reporting these vulnerabilities.

Severity Rating

For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.

Legal Information

Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEP5nobPoCj3pTvhAZgSlofD2Yi6cFAlvktrEACgkQgSlofD2Y

i6fVXw//QXRWQ+8d/vlhEeHj+xcCX8rggZXI9SnR0rNTEwfoaqRZugmauXNPMwRL

Jvkp96Al0RrTLNNxxq9iyqjRnGqUdpHgNlAP4kq+Zs785LlKrvj/2WH/AshwZhZM

yDdusIUVHpcV0eR/fm57gvINeGkn0ZU/Ili4xN9JF6CRuyNihi3LvlGlcsXwyQC5

Ja9HCOgM82uUz6NhsWw/GAD9Jxx/2ID3SfqL/m7/o7mioY+jlhGaL8JBlPurXSe6

atP851X2Fj4VnMNNgbvL55JF6/HTFhk2H4JmiuELWYKiCmQvWcp4b6tzzOvyA2VN

E71DlqVi33IvPbIbZtE2Ji/WLVrIvlFhXuT/4eihvX5bRt4F731+EPSW6jbKrqcT

l4bMYdqouvqMt4BU4Fcm2P5Ynv43rw+mZFnkluQ/XdXBA7micA5QlUZPSD1xKyCS

761uZwl9ccCymk8GRcwFaX3c7WIc1x7yLjbQ+JfvnFiD7TF7xCEdqZG/yD6FAzwz

sAXgNIjmPtq5XxL9DpHvnX4NpzTV87U7shfjPiU+mn1n/xaqo+c/MZGDWyloN7LN

sPWfwaBHV6I1GZMEDJ/1h8cJV/f2dvEfV5gHBEV2t+nmNvddpjZC4cAKCXd8BlAC

fRgraWppWLqHRv3EJVKDEzJlbUks8eQr/HmFovilRaQj/s5ljwg=

=s3w/

-----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201811-0038",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "emc recoverpoint",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dell",
        "version": "5.1.2.1"
      },
      {
        "model": "emc recoverpoint for virtual machines",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dell",
        "version": "5.2.0.2"
      },
      {
        "model": "recoverpoint",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell emc old emc",
        "version": "5.1.2.1"
      },
      {
        "model": "recoverpoint for virtual machines",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell emc old emc",
        "version": "5.2.0.2"
      },
      {
        "model": "emc recoverpoint for virtual machines",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "5.1.1"
      },
      {
        "model": "emc recoverpoint for virtual machines",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "5.1.1.3"
      },
      {
        "model": "emc recoverpoint for virtual machines",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "5.1.1.2"
      },
      {
        "model": "emc recoverpoint for virtual machines",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "5.1"
      },
      {
        "model": "emc recoverpoint",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "5.1.2"
      },
      {
        "model": "emc recoverpoint",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "5.1.0.1"
      },
      {
        "model": "emc recoverpoint",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "5.1"
      },
      {
        "model": "emc recoverpoint for virtual machines",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dell",
        "version": "5.2.0.2"
      },
      {
        "model": "emc recoverpoint",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dell",
        "version": "5.1.2.1"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "105916"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15772"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:emc:recoverpoint",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:emc:recoverpoint_for_virtual_machines",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Paul Taylor (@bao7uo)",
    "sources": [
      {
        "db": "BID",
        "id": "105916"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2018-15772",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-15772",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-126065",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-15772",
            "impactScore": 5.2,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-15772",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-15772",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201811-290",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-126065",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-126065"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-290"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15772"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dell EMC RecoverPoint versions prior to 5.1.2.1 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an uncontrolled resource consumption vulnerability. A malicious boxmgmt user may potentially be able to consume large amount of CPU bandwidth to make the system slow or to determine the existence of any system file via Boxmgmt CLI. Dell EMC RecoverPoint are prone to an information-disclosure vulnerability and a denial-of-service vulnerability. \nSuccessfully exploiting these issues may allow an attacker to obtain   sensitive information or to consume excessive resources,  resulting in a  denial of service. The former is a set of disaster recovery and data protection software, and the latter is a set of disaster recovery solutions for VMware environments. \n\n\n\n\n\nLink to remedies:\n\nCustomers can download software from: https://support.emc.com/search/?text=RecoverPoint\u0026searchLang=en_US\u0026facetResource=DOWN\n\n\n\n\n\nCredits:\n\nDell EMC would like to thank Paul Taylor (@bao7uo) for reporting these vulnerabilities. \n\n\n\nSeverity Rating\n\nFor an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. \n\n\n\nLegal Information\n\nRead and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided \"as is\" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus\n iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. \n\n-----BEGIN PGP SIGNATURE-----\n\n\n\niQIzBAEBCAAdFiEEP5nobPoCj3pTvhAZgSlofD2Yi6cFAlvktrEACgkQgSlofD2Y\n\ni6fVXw//QXRWQ+8d/vlhEeHj+xcCX8rggZXI9SnR0rNTEwfoaqRZugmauXNPMwRL\n\nJvkp96Al0RrTLNNxxq9iyqjRnGqUdpHgNlAP4kq+Zs785LlKrvj/2WH/AshwZhZM\n\nyDdusIUVHpcV0eR/fm57gvINeGkn0ZU/Ili4xN9JF6CRuyNihi3LvlGlcsXwyQC5\n\nJa9HCOgM82uUz6NhsWw/GAD9Jxx/2ID3SfqL/m7/o7mioY+jlhGaL8JBlPurXSe6\n\natP851X2Fj4VnMNNgbvL55JF6/HTFhk2H4JmiuELWYKiCmQvWcp4b6tzzOvyA2VN\n\nE71DlqVi33IvPbIbZtE2Ji/WLVrIvlFhXuT/4eihvX5bRt4F731+EPSW6jbKrqcT\n\nl4bMYdqouvqMt4BU4Fcm2P5Ynv43rw+mZFnkluQ/XdXBA7micA5QlUZPSD1xKyCS\n\n761uZwl9ccCymk8GRcwFaX3c7WIc1x7yLjbQ+JfvnFiD7TF7xCEdqZG/yD6FAzwz\n\nsAXgNIjmPtq5XxL9DpHvnX4NpzTV87U7shfjPiU+mn1n/xaqo+c/MZGDWyloN7LN\n\nsPWfwaBHV6I1GZMEDJ/1h8cJV/f2dvEfV5gHBEV2t+nmNvddpjZC4cAKCXd8BlAC\n\nfRgraWppWLqHRv3EJVKDEzJlbUks8eQr/HmFovilRaQj/s5ljwg=\n\n=s3w/\n\n-----END PGP SIGNATURE-----\n\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-15772"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      },
      {
        "db": "BID",
        "id": "105916"
      },
      {
        "db": "VULHUB",
        "id": "VHN-126065"
      },
      {
        "db": "PACKETSTORM",
        "id": "150264"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-15772",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "105916",
        "trust": 1.4
      },
      {
        "db": "SECTRACK",
        "id": "1042059",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-290",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-15726",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-126065",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "150264",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-126065"
      },
      {
        "db": "BID",
        "id": "105916"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      },
      {
        "db": "PACKETSTORM",
        "id": "150264"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-290"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15772"
      }
    ]
  },
  "id": "VAR-201811-0038",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-126065"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:00:12.258000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Dell EMC RecoverPoint Data Protection Software",
        "trust": 0.8,
        "url": "https://shop.dellemc.com/en-us/Product-Family/EMC-RecoverPoint-Products/Dell-EMC-RecoverPoint-for-Virtual-Machines-Data-Protection-Software/p/EMC-RecoverPoint-VM?PID=EMC_OTHR-RCVRPTVM-EB48_SPLSH"
      },
      {
        "title": "Dell EMC RecoverPoint for Virtual Machines Data Protection Software",
        "trust": 0.8,
        "url": "https://shop.dellemc.com/en-us/Solve-For/STORAGE-PRODUCTS/Dell-EMC-RecoverPoint-Data-Protection-Software/p/EMC-RecoverPoint?productCode=\u0026fromPage=PVP"
      },
      {
        "title": "Dell EMC RecoverPoint  and RecoverPoint for Virtual Machines Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86722"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-290"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-400",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-126065"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15772"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "https://seclists.org/fulldisclosure/2018/nov/34"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/105916"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1042059"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15772"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15772"
      },
      {
        "trust": 0.3,
        "url": "http://dell.com"
      },
      {
        "trust": 0.1,
        "url": "https://support.emc.com/servicecenter/contactemc/)."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15771"
      },
      {
        "trust": 0.1,
        "url": "https://support.emc.com/kb/468307)."
      },
      {
        "trust": 0.1,
        "url": "https://support.emc.com/search/?text=recoverpoint\u0026searchlang=en_us\u0026facetresource=down"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-126065"
      },
      {
        "db": "BID",
        "id": "105916"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      },
      {
        "db": "PACKETSTORM",
        "id": "150264"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-290"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15772"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-126065"
      },
      {
        "db": "BID",
        "id": "105916"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      },
      {
        "db": "PACKETSTORM",
        "id": "150264"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-290"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15772"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-11-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-126065"
      },
      {
        "date": "2018-11-14T00:00:00",
        "db": "BID",
        "id": "105916"
      },
      {
        "date": "2019-03-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      },
      {
        "date": "2018-11-12T17:05:21",
        "db": "PACKETSTORM",
        "id": "150264"
      },
      {
        "date": "2018-11-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201811-290"
      },
      {
        "date": "2018-11-13T14:29:00.293000",
        "db": "NVD",
        "id": "CVE-2018-15772"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-02-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-126065"
      },
      {
        "date": "2018-11-14T00:00:00",
        "db": "BID",
        "id": "105916"
      },
      {
        "date": "2019-03-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      },
      {
        "date": "2019-02-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201811-290"
      },
      {
        "date": "2024-11-21T03:51:26.520000",
        "db": "NVD",
        "id": "CVE-2018-15772"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "105916"
      }
    ],
    "trust": 0.3
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dell EMC RecoverPoint and  RecoverPoint for VMs Vulnerable to resource exhaustion",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-014242"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-290"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.