Authentication bypass in EMC Secure Remote Services



Published: 2017-06-20
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-4986
CWE-ID CWE-592
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
EMC Secure Remote Services
Web applications / Remote management & hosting panels

Vendor Dell

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Authentication bypass

EUVDB-ID: #VU7122

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-4986

CWE-ID: CWE-592 - Authentication Bypass Issues

Exploit availability: No

Description

The vulnerability allows a remote unauthenticated attacker to bypass authentication on the target system.

The weakness exists due to unsafe authentication mechanism. A remote attacker can bypass authentication and potentially read sensitive log data containing usernames and IP addresses.

Successful exploitation of the vulnerability may result in information disclosure.

Mitigation

Update to version 3.20.

Vulnerable software versions

EMC Secure Remote Services: 3.0 - 3.18

External links

http://www.securityfocus.com/archive/1/540721/30/0/threaded


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###