Lucene search

K
cve[email protected]CVE-2022-34380
HistorySep 01, 2022 - 7:15 p.m.

CVE-2022-34380

2022-09-0119:15:12
CWE-287
web.nvd.nist.gov
23
3
dell
cloudlink
cve-2022-34380
authentication bypass
vulnerability
nvd

9.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Dell CloudLink 7.1.3 and all earlier versions contain an Authentication Bypass Using an Alternate Path or Channel Vulnerability. A high privileged local attacker may potentially exploit this vulnerability leading to authentication bypass and access the CloudLink system console. This is critical severity vulnerability as it allows attacker to take control of the system.

Affected configurations

NVD
Node
dellcloudlinkRange<7.1.4
CPENameOperatorVersion
dell:cloudlinkdell cloudlinklt7.1.4

CNA Affected

[
  {
    "product": "CloudLink",
    "vendor": "Dell",
    "versions": [
      {
        "lessThan": "7.1.4",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

9.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2022-34380