Security restrictions bypass in EMC ESRS Policy Manager



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-4976
CWE-ID CWE-264
Exploitation vector Local network
Public exploit N/A
Vulnerable software
EMC ESRS Policy Manager
Client/Desktop applications / Other client software

Vendor Dell

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU7392

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2017-4976

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to bypass security restrictions.

The weakness exists due to use of default password by an undocumented account ('OpenDS admin').A remote attacker with the knowledge of the default password may login to the system and gain administrator privileges on the local LDAP directory server.

Successful exploitation of the vulnerability results in full access to the affected system.

Mitigation

Update to version 6.8.

Vulnerable software versions

EMC ESRS Policy Manager: 6.6

CPE2.3 External links

https://seclists.org/fulldisclosure/2017/Jul/13


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###