[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [FD] DSA-2018-136: Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability
From: <secure () Dell ! com>
Date: 2018-10-29 21:35:27
Message-ID: 3fdd2a4ac1c54710af3e9bd6b0f32bdc () AUSX13MPS302 ! AMER ! DELL ! COM
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
DSA-2018-136: Dell EMC Integrated Data Protection Appliance Undocumented Accounts Vulnerability
Dell EMC Identifier DSA-2018-136
CVE Identifier CVE-2018-11062
Severity: High
CVSSv3 Base Score: 8.6 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)
Affected products:
Dell EMC Integrated Data Protection Appliance 2.0
Dell EMC Integrated Data Protection Appliance 2.1
Dell EMC Integrated Data Protection Appliance 2.2
Summary:
Integrated Data Protection Appliance (iDPA) contains undocumented accounts with limited access \
which may potentially be used by a malicious user to compromise the affected system.
Details:
Integrated Data Protection Appliance versions 2.0, 2.1, and 2.2 contain undocumented accounts \
named "support" and "admin" that are protected with default passwords. These accounts have \
limited privileges and can access certain system files only. A malicious user with the \
knowledge of the default passwords may potentially log in to the system and gain read and write \
access to certain system files.
Resolution:
Follow the steps below to remove the user accounts named "support" and "admin" from the \
impacted virtual machines in the Integrated Data Protection Appliance. There is no loss of \
supportability or any other product functionality as a result of the removal of these accounts.
Log in to Data Protection Advisor - Datastore Server Virtual Machine using an SSH client such \
as PuTTY, as root user and execute the following commands:
Delete the user "support"
userdel support
Delete the user "admin"
userdel admin
Verify that the accounts are deleted. The following commands should display "no such user" as \
the output.
id support
id admin
For Integrated Data Protection Appliance 2.0 and 2.1, repeat the above procedure for Data \
Protection Advisor - Application server, Data Protection Advisor - Agent, Data Protection \
Advisor - DD Data Processor Tool and Appliance Configuration Manager Virtual Machines.
For Integrated Data Protection Appliance 2.2, repeat the above procedure for Data Protection \
Advisor - Application Server and Appliance Configuration Manager Virtual Machines.
Dell EMC strongly recommends that customers follow the security best practices documented in \
the iDPA Security Configuration Guide to secure their deployment at \
https://support.emc.com/products/41849_Integrated-Data-Protection-Appliance/Documentation/
Link To Remedies:
Registered Dell EMC Online Support customers can also download a patch at:
Dell EMC Integrated Data Protection Appliance (IDPA) 2.1 - \
https://download.emc.com/downloads/DL89669_Idpa_post_update_2.1.0.599285.tar.gz
If you have any questions, contact Dell EMC Support.
Severity Rating
For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 \
(https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both \
the base score and any relevant temporal and environmental scores which may impact the \
potential severity associated with particular security vulnerability.
Legal Information
Read and use the information in this Dell EMC Security Advisory to assist in avoiding any \
situation that might arise from the problems described herein. If you have any questions \
regarding this advisory, contact Dell EMC Technical Support \
(https://support.emc.com/servicecenter/contactEMC/). Dell EMC distributes Dell EMC Security \
Advisories, in order to bring to the attention of users of the affected Dell EMC products, \
important security information. Dell EMC recommends that all users determine the applicability \
of this information to their individual situations and take appropriate action. The information \
set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all \
warranties, either express or implied, including the warranties of merchantability, fitness for \
a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, \
be liable for any damages whatsoever including direct, indirect, incidental, consequential, \
loss of bus iness profits or special damages, even if Dell EMC or its suppliers have been \
advised of the possibility of such damages. Some states do not allow the exclusion or \
limitation of liability for consequential or incidental damages, so the foregoing limitation \
may not apply.
Dell Product Security Incident Response Team
secure@dell.com
-----BEGIN PGP SIGNATURE-----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=ATU/
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic