XXE attack in EMC Unisphere and ViPR SRM



Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID N/A
CWE-ID CWE-611
Exploitation vector Network
Public exploit N/A
Vulnerable software
EMC ViPR SRM
Client/Desktop applications / Software for archiving

EMC Unisphere
Server applications / Other server solutions

Vendor Dell

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) XXE attack

EUVDB-ID: #VU12275

Risk: Low

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: N/A

CWE-ID: CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to improper restriction of XML external entity reference. A remote attacker can cause the service to crash, conduct XML external entity attacks to obtain files and gain root privileges.

Mitigation

Update to version 4.1.1.

Vulnerable software versions

EMC ViPR SRM: 4.1

CPE2.3 External links

https://seclists.org/fulldisclosure/2018/Apr/54


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to open a a specially crafted archive.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) XXE attack

EUVDB-ID: #VU12276

Risk: Low

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: N/A

CWE-ID: CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to improper restriction of XML external entity reference. A remote attacker can cause the service to crash, conduct XML external entity attacks to obtain files and gain root privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

EMC Unisphere: 8.0.0 - 8.4

CPE2.3 External links

https://seclists.org/fulldisclosure/2018/Apr/54


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to open a a specially crafted archive.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###