Lucene search

K
nvd[email protected]NVD:CVE-2023-48668
HistoryDec 14, 2023 - 4:15 p.m.

CVE-2023-48668

2023-12-1416:15:50
CWE-78
web.nvd.nist.gov
3
dell powerprotect
command injection
privilege escalation
system takeover
os command

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.2%

Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 on DDMC contain an OS command injection vulnerability in an admin operation. A local high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the managed system application’s underlying OS with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker on a managed system of DDMC.

Affected configurations

Nvd
Node
dellpowerprotect_data_domain_management_centerRange<6.2.1.110
OR
dellpowerprotect_data_domain_management_centerRange7.07.13.0.10
OR
dellpowerprotect_data_domain_management_centerRange7.77.7.5.25lts2022
OR
dellpowerprotect_data_domain_management_centerRange7.107.10.1.15lts2023
VendorProductVersionCPE
dellpowerprotect_data_domain_management_center*cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*
dellpowerprotect_data_domain_management_center*cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*
dellpowerprotect_data_domain_management_center*cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.2%

Related for NVD:CVE-2023-48668