CVE-2017-8011
Dell EMC VNX Monitoring and Reporting Scheduler Static Credentials Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
EMC ViPR SRM, EMC Storage M&R, EMC VNX M&R, EMC M&R for SAS Solution Packs (EMC ViPR SRM prior to 4.1, EMC Storage M&R prior to 4.1, EMC VNX M&R all versions, EMC M&R (Watch4Net) for SAS Solution Packs all versions) contain undocumented accounts with default passwords for Webservice Gateway and RMI JMX components. A remote attacker with the knowledge of the default password may potentially use these accounts to run arbitrary web service and remote procedure calls on the affected system.
EMC ViPR SRM, EMC Storage M&R, EMC VNX M&R, EMC M&R para SAS Solution Packs (EMC ViPR SRM anterior a versión 4.1, EMC Storage M&R anterior a versión 4.1, EMC VNX M&R todas las versiones, EMC M&R (Watch4Net) para todas las versiones de SAS Solution Packs), contienen cuentas no documentadas con contraseñas por defecto para los componentes WebService Gateway y RMI JMX. Un atacante remoto con conocimiento de la contraseña por defecto puede usar estas cuentas para ejecutar servicios web arbitrarios y llamadas a procedimientos remotos sobre el sistema afectado.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dell EMC VNX Monitoring and Reporting. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the Scheduler class. An attacker can use the static credentials to access VNX Webservice Gateway service's API to execute arbitrary code under the context of SYSTEM.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-04-21 CVE Reserved
- 2017-07-12 CVE Published
- 2024-08-05 CVE Updated
- 2024-11-23 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2017/Jul/21 | Mailing List | |
http://www.securityfocus.com/bid/99555 | Third Party Advisory | |
http://www.securitytracker.com/id/1038905 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Dell Search vendor "Dell" | Emc M\&r Search vendor "Dell" for product "Emc M\&r" | - | - |
Affected
| ||||||
Dell Search vendor "Dell" | Emc Storage Monitoring And Reporting Search vendor "Dell" for product "Emc Storage Monitoring And Reporting" | 4.0.2 Search vendor "Dell" for product "Emc Storage Monitoring And Reporting" and version "4.0.2" | - |
Affected
| ||||||
Dell Search vendor "Dell" | Emc Vipr Srm Search vendor "Dell" for product "Emc Vipr Srm" | <= 4.0.2 Search vendor "Dell" for product "Emc Vipr Srm" and version " <= 4.0.2" | - |
Affected
| ||||||
Dell Search vendor "Dell" | Emc Vnx Monitoring And Reporting Search vendor "Dell" for product "Emc Vnx Monitoring And Reporting" | - | - |
Affected
|