// For flags

CVE-2017-14375

EMC Unisphere For VMAX vApp Manager ORBServlet Remote Credential Creation Information Disclosure Vulnerability

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

EMC Unisphere for VMAX Virtual Appliance (vApp) versions prior to 8.4.0.15, EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.15, EMC VASA Virtual Appliance versions prior to 8.4.0.512, and EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier) contain an authentication bypass vulnerability that may potentially be exploited by malicious users to compromise the affected system.

EMC Unisphere para VMAX Virtual Appliance (vApp) en versiones anteriores a la 8.4.0.15, EMC Solutions Enabler Virtual Appliance en versiones anteriores a la 8.4.0.15, EMC VASA Virtual Appliance en versiones anteriores a la 8.4.0.512, y EMC VMAX Embedded Management (eManagement) en su versión 1.4 y anteriores (Enginuity Release 5977.1125.1125 y anteriores) contiene una vulnerabilidad de omisión de autenticación que podría ser explotada por usuarios maliciosos con el fin de comprometer el sistema afectado.

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of EMC Unisphere For VMAX vApp Manager. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the ORBServlet. The vulnerability is caused by improper access controls that allow the creation of admin credentials. An attacker can leverage this vulnerability to disclose sensitive information under the context of the web application.

*Credits: rgod
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-09-12 CVE Reserved
  • 2017-10-31 CVE Published
  • 2023-06-20 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-290: Authentication Bypass by Spoofing
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dell
Search vendor "Dell"
Emc Unisphere
Search vendor "Dell" for product "Emc Unisphere"
< 8.4.0.15
Search vendor "Dell" for product "Emc Unisphere" and version " < 8.4.0.15"
vmax
Affected
Emc
Search vendor "Emc"
Solutions Enabler
Search vendor "Emc" for product "Solutions Enabler"
< 8.4.0.15
Search vendor "Emc" for product "Solutions Enabler" and version " < 8.4.0.15"
-
Affected
Emc
Search vendor "Emc"
Vasa
Search vendor "Emc" for product "Vasa"
< 8.4.0.512
Search vendor "Emc" for product "Vasa" and version " < 8.4.0.512"
-
Affected
Emc
Search vendor "Emc"
Vmax Emanagement
Search vendor "Emc" for product "Vmax Emanagement"
<= 1.4
Search vendor "Emc" for product "Vmax Emanagement" and version " <= 1.4"
-
Affected