Lucene search

K
saintSAINT CorporationSAINT:32F32980A0BCDCA830C690939ED433CD
HistoryJul 05, 2018 - 12:00 a.m.

EMC RecoverPoint command injection in SSH username

2018-07-0500:00:00
SAINT Corporation
download.saintcorporation.com
27

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.045 Low

EPSS

Percentile

92.5%

Added: 07/05/2018
CVE: CVE-2018-1235
BID: 104246

Background

Dell EMC RecoverPoint is an application recovery solution.

Problem

A command injection vulnerability allows a remote attacker to execute arbitrary commands embedded in the username of an SSH authentication request.

Resolution

Upgrade to Dell EMC RecoverPoint for Virtual Machines 5.1.1.3 or higher, or to Dell EMC RecoverPoint 5.1.2 or later.

References

<http://seclists.org/fulldisclosure/2018/May/61&gt;
<https://www.foregenix.com/blog/foregenix-identify-multiple-dellemc-recoverpoint-zero-day-vulnerabilities&gt;

Platforms

Linux

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.045 Low

EPSS

Percentile

92.5%