// For flags

CVE-2017-8013

EMC Data Protection Advisor Application Service Static Credentials Authentication Bypass Vulnerability

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

EMC Data Protection Advisor 6.3.x before patch 67 and 6.4.x before patch 130 contains undocumented accounts with hard-coded passwords and various privileges. Affected accounts are: "Apollo System Test", "emc.dpa.agent.logon" and "emc.dpa.metrics.logon". An attacker with knowledge of the password could potentially use these accounts via REST APIs to gain unauthorized access to EMC Data Protection Advisor (including potentially access with administrative privileges).

Las versiones 6.3.x anteriores al patch 67 y las versiones 6.4.x anteriores a patch 130 de EMC Data Protection Advisor contienen cuentas no documentadas con contraseñas embebidas y varios privilegios. Las cuentas afectadas son: "Apollo System Test", "emc.dpa.agent.logon" y "emc.dpa.metrics.logon". Un atacante que conozca las contraseñas podría emplear estas cuentas mediante API REST para obtener acceso no autorizado a EMC Data Protection Advisor (incluyendo el potencial acceso con privilegios administrativos).

This vulnerability allows remote attackers to escalate privileges on vulnerable installations of EMC Data Protection Advisor. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the EMC DPA Application service, which listens on TCP port 9002 by default. The issue results from hard-coded hidden user entries within the application database. An attacker can leverage this vulnerability to bypass authentication under the context of the Administrator.

*Credits: rgod
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-04-21 CVE Reserved
  • 2017-09-15 CVE Published
  • 2023-12-30 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-798: Use of Hard-coded Credentials
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Emc
Search vendor "Emc"
Data Protection Advisor
Search vendor "Emc" for product "Data Protection Advisor"
6.3.0
Search vendor "Emc" for product "Data Protection Advisor" and version "6.3.0"
-
Affected
Emc
Search vendor "Emc"
Data Protection Advisor
Search vendor "Emc" for product "Data Protection Advisor"
6.4.0
Search vendor "Emc" for product "Data Protection Advisor" and version "6.4.0"
-
Affected