Page 138 of 1115 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Dell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to authentication bypass and remote takeover of the InsightIQ. This allows an attacker to take complete control of InsightIQ to affect services provided by SSH; so Dell recommends customers to upgrade at the earliest opportunity. Dell EMC InsightIQ versiones anteriores a 4.1.4, contienen algoritmos criptográficos arriesgados en el componente SSH. Un atacante remoto no autenticado podría potencialmente explotar esta vulnerabilidad conllevando a una omisión de la autenticación y a la toma remota del InsightIQ. • https://www.dell.com/support/kbdoc/000191604 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary .dll file via .dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's, SupportAssist Client versiones 3.8 y 3.9, contienen una vulnerabilidad de ruta de búsqueda no Confiable que permite a atacantes cargar un archivo .dll arbitrario por medio de una plantación/secuestro de .dll, sólo por una acción administrativa independiente que no es una parte predeterminada de la instalación de SOSInstallerTool.exe para ejecutar dll's arbitrarios • https://www.dell.com/support/kbdoc/en-us/000191057/dsa-2021-163-dell-supportassist-client-consumer-security-update-for-two-vulnerabilities • CWE-426: Untrusted Search Path •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any(non-privileged) user under some object directories, but by themselves are not sufficient to successfully escalate privileges. However, combining them with a different object, such as the NTFS junction point allows for the exploitation. Support assist clean files functionality do not distinguish junction points from the physical folder and proceeds to clean the target of the junction that allows nonprivileged users to create junction points and delete arbitrary files on the system which can be accessed only by the admin. Dell SupportAssist Client Consumer versiones 3.9.13.0 y todas las versiones anteriores a 3.9.13.0, contienen una vulnerabilidad de eliminación de archivos arbitrarios que puede ser explotada al usar la función de Windows de NTFS denominada enlaces Simbólicos. • https://www.dell.com/support/kbdoc/en-us/000191057/dsa-2021-163-dell-supportassist-client-consumer-security-update-for-two-vulnerabilities • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 5.7EPSS: 0%CPEs: 42EXPL: 0

Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive NVMe password attempt mitigations in order to carry out a brute force attack. Dell BIOS contiene una vulnerabilidad de restricción inapropiada de intentos de autenticación excesivos. Un administrador local autenticado malicioso podría explotar esta vulnerabilidad para omitir las mitigaciones de intentos de contraseña excesivos de NVMe con el fin de llevar a cabo un ataque de fuerza bruta • https://www.dell.com/support/kbdoc/000191495 • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 5.7EPSS: 0%CPEs: 42EXPL: 0

Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive admin password attempt mitigations in order to carry out a brute force attack. Dell BIOS contiene una vulnerabilidad de Restricción Inapropiada de Intentos de Autenticación Excesivos. Un administrador local autenticado y malicioso podría explotar esta vulnerabilidad para omitir las mitigaciones de intentos excesivos de contraseñas de administrador con el fin de llevar a cabo un ataque de fuerza bruta • https://www.dell.com/support/kbdoc/000191495 • CWE-307: Improper Restriction of Excessive Authentication Attempts •