Lucene search

K
saintSAINT CorporationSAINT:42B66F6BD777DC6CD34D8B75530C5CD7
HistoryJul 05, 2018 - 12:00 a.m.

EMC RecoverPoint command injection in SSH username

2018-07-0500:00:00
SAINT Corporation
my.saintcorporation.com
519

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.045 Low

EPSS

Percentile

92.5%

Added: 07/05/2018
CVE: CVE-2018-1235
BID: 104246

Background

Dell EMC RecoverPoint is an application recovery solution.

Problem

A command injection vulnerability allows a remote attacker to execute arbitrary commands embedded in the username of an SSH authentication request.

Resolution

Upgrade to Dell EMC RecoverPoint for Virtual Machines 5.1.1.3 or higher, or to Dell EMC RecoverPoint 5.1.2 or later.

References

<http://seclists.org/fulldisclosure/2018/May/61&gt;
<https://www.foregenix.com/blog/foregenix-identify-multiple-dellemc-recoverpoint-zero-day-vulnerabilities&gt;

Platforms

Linux

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.045 Low

EPSS

Percentile

92.5%