CVE-2017-8013
EMC Data Protection Advisor Application Service Static Credentials Authentication Bypass Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
EMC Data Protection Advisor 6.3.x before patch 67 and 6.4.x before patch 130 contains undocumented accounts with hard-coded passwords and various privileges. Affected accounts are: "Apollo System Test", "emc.dpa.agent.logon" and "emc.dpa.metrics.logon". An attacker with knowledge of the password could potentially use these accounts via REST APIs to gain unauthorized access to EMC Data Protection Advisor (including potentially access with administrative privileges).
Las versiones 6.3.x anteriores al patch 67 y las versiones 6.4.x anteriores a patch 130 de EMC Data Protection Advisor contienen cuentas no documentadas con contraseñas embebidas y varios privilegios. Las cuentas afectadas son: "Apollo System Test", "emc.dpa.agent.logon" y "emc.dpa.metrics.logon". Un atacante que conozca las contraseñas podrÃa emplear estas cuentas mediante API REST para obtener acceso no autorizado a EMC Data Protection Advisor (incluyendo el potencial acceso con privilegios administrativos).
This vulnerability allows remote attackers to escalate privileges on vulnerable installations of EMC Data Protection Advisor. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the EMC DPA Application service, which listens on TCP port 9002 by default. The issue results from hard-coded hidden user entries within the application database. An attacker can leverage this vulnerability to bypass authentication under the context of the Administrator.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-04-21 CVE Reserved
- 2017-09-15 CVE Published
- 2023-12-30 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2017/Sep/36 | Mailing List | |
http://www.securityfocus.com/bid/100846 | Third Party Advisory | |
http://www.securitytracker.com/id/1039370 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Emc Search vendor "Emc" | Data Protection Advisor Search vendor "Emc" for product "Data Protection Advisor" | 6.3.0 Search vendor "Emc" for product "Data Protection Advisor" and version "6.3.0" | - |
Affected
| ||||||
Emc Search vendor "Emc" | Data Protection Advisor Search vendor "Emc" for product "Data Protection Advisor" | 6.4.0 Search vendor "Emc" for product "Data Protection Advisor" and version "6.4.0" | - |
Affected
|