[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] DSA-2018-095: Dell EMC RecoverPoint Multiple Vulnerabilities
From:       EMC Product Security Response Center <Security_Alert () emc ! com>
Date:       2018-05-22 12:28:32
Message-ID: 1BF8853173D9704A93EF882F85952A894A661D () MX304CL04 ! corp ! emc ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

DSA-2018-095: Dell EMC RecoverPoint Multiple Vulnerabilities

EMC Identifier:	DSA-2018-095

CVE Identifier: CVE-2018-1235, CVE-2018-1241, CVE-2018-1242

Severity Rating: CVSS Base Score: See below for CVSSv3 Scores.

Affected products: 
Dell EMC RecoverPoint versions prior to 5.1.2
Dell EMC RecoverPoint Virtual Machine (VM) versions prior to 5.1.1.3

Summary:  
Dell EMC RecoverPoint addresses multiple security vulnerabilities which may potentially be \
exploited by malicious users to compromise the affected system.

Details:
Unauthenticated Command Injection Vulnerability

CVE-2018-1235

Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to \
5.1.1.3, contain a command injection vulnerability. An unauthenticated remote attacker may \
potentially exploit this vulnerability to execute arbitrary commands on the affected system \
with root privilege.

CVSSv3 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

LDAP Password Disclosure Vulnerability

CVE-2018-1241

Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to \
5.1.1.3, under certain conditions, may leak LDAP password in plain-text into the RecoverPoint \
log file. An authenticated malicious user with access to the RecoverPoint log files may obtain \
the exposed LDAP password to use it in further attacks.

CVSSv3 Base Score: 6.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N)

Authenticated Arbitrary File Read Vulnerability

CVE-2018-1242

Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to \
5.1.1.3, contains a command injection vulnerability in the Boxmgmt CLI. An authenticated \
malicious user with boxmgmt privileges may potentially exploit this vulnerability to read RPA \
files. Note that files that require root permission cannot be read.

CVSSv3 Base Score: 6.7 (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)

Resolution:	
The following Dell EMC RecoverPoint releases addresses these vulnerabilities: 

Dell EMC RecoverPoint for Virtual Machines 5.1.1.3 and later

Dell EMC RecoverPoint 5.1.2 and later

Dell EMC recommends all customers upgrade at the earliest opportunity. In addition, to fully \
mitigate CVE-2018-1241, customers are recommended to change their LDAP passwords.

Note: It is a security best practice to change any default system passwords to strong and \
unique values. Refer to RecoverPoint Security Configuration Guide for details. Refer to Dell \
EMC Knowledge Base Article 520937 for instructions on how to change default root password in \
RecoverPoint systems.

Link To Remedies:	
Customers can download software from EMC Online Suport at \
https://support.emc.com/search/?text=RecoverPoint&searchLang=en_US&facetResource=DOWN

Credits:
Dell EMC would like to thank Paul Taylor (@bao7uo) from Foregenix Ltd for reporting these \
vulnerabilities.

Read and use the information in this EMC Security Advisory to assist in avoiding any situation \
that might arise from  the problems described herein. If you have any questions regarding this \
product alert, contact EMC Software Technical  Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC \
recommends all customers  take into account both the base score and any relevant temporal and \
environmental scores which may impact the potential  severity associated with particular \
security vulnerability.

EMC recommends that all users determine the applicability of this information to their \
individual situations and take  appropriate action. The information set forth herein is \
provided "as is" without warranty of any kind. EMC disclaims  all warranties, either express or \
implied, including the warranties of merchantability, fitness for a particular  purpose, title \
and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages \
whatsoever  including direct, indirect, incidental, consequential, loss of business profits or \
special damages, even if EMC or its  suppliers have been advised of the possibility of such \
damages. Some states do not allow the exclusion or limitation of  liability for consequential \
                or incidental damages, so the foregoing limitation may not apply.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJbAtF7AAoJEHbcu+fsE81Z5YYH/3ltdBwWAKvTIkWHK7c2CrT6
JLIf1NyTCQdT8yfjCAtmmThN0q/1KwrtBm31/btbkDRAIFOiJU/L7FSTi/TPUw6Y
Y2H28D8vQ3fft1g8Uv4fIqx5X6FD/R8N5mpmANo8G73j0INLNm+JnqBS3BOVBU3g
L01OHMuLiabtFARcWvQ2QXJfd4yJAydvHe6r6/nY+5kC30uoLFr+yEFvGdyyWPxh
wMw492QrSuesy5Pft9degWvZrZelKNN6hitTSxrr5SKotHCEsmrmXeY/7R8jAsuV
ad3h1hwEtCxUNCdBOiZFRf8zKwWzc7+fVJ7QcWIpDbB2BTSlFE2d41lx5xGgvIY=
=qlnC
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic