9 results (0.012 seconds)

CVSS: 5.9EPSS: 0%CPEs: 3EXPL: 0

Dell EMC Unity versions before 5.2.0.0.5.173 , use(es) broken cryptographic algorithm. A remote unauthenticated attacker could potentially exploit this vulnerability by performing MitM attacks and let attackers obtain sensitive information. • https://www.dell.com/support/kbdoc/en-us/000199050/dsa-2022-021-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Dell EMC Unity, Dell EMC UnityVSA and Dell EMC Unity XT versions prior to 5.1.2.0.5.007 contain an operating system (OS) command injection Vulnerability. A locally authenticated user with high privileges may potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the Unity underlying OS, with the privileges of the vulnerable application. Exploitation may lead to an elevation of privilege. Dell EMC Unity, Dell EMC UnityVSA y Dell EMC Unity XT versiones anteriores a 5.1.2.0.5.007, contienen una vulnerabilidad de inyección de comandos del sistema operativo (SO). Un usuario autenticado localmente con altos privilegios puede potencialmente explotar esta vulnerabilidad, conllevando a una ejecución de comandos arbitrarios del SO en el SO subyacente de Unity, con los privilegios de la aplicación vulnerable. • https://www.dell.com/support/kbdoc/en-us/000194836/dsa-2021-271-dell-emc-unity-dell-emc-unity-vsa-and-dell-emc-unity-xt-security-update-for-multiple-vulnerabilities • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.7EPSS: 0%CPEs: 3EXPL: 0

Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.1.0.0.5.394 contain a plain-text password storage vulnerability. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user. Dell EMC Unity, Unity XT y UnityVSA versiones anteriores a 5.1.0.5.394, contienen una vulnerabilidad de almacenamiento de contraseñas en texto plano. Un usuario local malicioso con altos privilegios puede usar la contraseña expuesta para conseguir acceso con los privilegios del usuario comprometido • https://www.dell.com/support/kbdoc/000189204 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •

CVSS: 6.7EPSS: 0%CPEs: 3EXPL: 0

Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.1.0.0.5.394 contain a plain-text password storage vulnerability. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user. Dell EMC Unity, Unity XT y UnityVSA versiones anteriores a 5.1.0.5.394, contienen una vulnerabilidad en el almacenamiento de contraseñas de texto plano. Un usuario local malicioso con altos privilegios puede usar la contraseña expuesta para conseguir acceso con los privilegios del usuario comprometido • https://www.dell.com/support/kbdoc/000189204 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •

CVSS: 6.7EPSS: 0%CPEs: 3EXPL: 0

Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.1.0.0.5.394 do not exit on failed Initialization. A local authenticated Service user could potentially exploit this vulnerability to escalate privileges. Dell EMC Unity, Unity XT y UnityVSA versiones anteriores a 5.1.0.5.394, no escapan en un fallo de inicialización. Un usuario local autenticado del Servicio podría explotar potencialmente esta vulnerabilidad para escalar privilegios • https://www.dell.com/support/kbdoc/000189204 •