// For flags

CVE-2018-1214

 

Severity Score

7.0
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Dell EMC SupportAssist Enterprise version 1.1 creates a local Windows user account named "OMEAdapterUser" with a default password as part of the installation process. This unnecessary user account also remains even after an upgrade from v1.1 to v1.2. Access to the management console can be achieved by someone with knowledge of the default password. If SupportAssist Enterprise is installed on a server running OpenManage Essentials (OME), the OmeAdapterUser user account is added as a member of the OmeAdministrators group for the OME. An unauthorized person with knowledge of the default password and access to the OME web console could potentially use this account to gain access to the affected installation of OME with OmeAdministrators privileges. This is fixed in version 1.2.1.

La versión 1.1 de Dell EMC SupportAssist Enterprise crea una cuenta Windows de usuario local llamada "OMEAdapterUser" con una contraseña por defecto como parte del proceso de instalación. Esta cuenta de usuario innecesaria se mantiene incluso tras una actualización de la versión v1.1 a v1.2. Alguien que conozca la contraseña por defecto podrá acceder a la consola de gestión. Si SupportAssist Enterprise está instalado en un servidor que ejecuta OpenManage Essentials (OME), la cuenta de usuario OmeAdapterUser se añade como miembro del grupo OmeAdministrators para el OME. Una persona no autorizada que conozca la contraseña por defecto y acceda a la consola web de OME podría emplear esta cuenta para obtener acceso a la instalación afectada de OME con privilegios de OmeAdministrators. Esto se ha solucionado en la versión 1.2.1.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-12-06 CVE Reserved
  • 2018-02-12 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-798: Use of Hard-coded Credentials
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dell
Search vendor "Dell"
Emc Supportassist Enterprise
Search vendor "Dell" for product "Emc Supportassist Enterprise"
1.1
Search vendor "Dell" for product "Emc Supportassist Enterprise" and version "1.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe