#VU41867 Input validation error in VPLEX GeoSynchrony - CVE-2014-0633


| Updated: 2020-08-10

Vulnerability identifier: #VU41867

Vulnerability risk: Medium

CVSSv4.0: 5.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2014-0633

CWE-ID: CWE-20

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
VPLEX GeoSynchrony
Server applications / Virtualization software

Vendor: Dell

Description

The vulnerability allows a remote #AU# to execute arbitrary code.

The GUI in EMC VPLEX GeoSynchrony 4.x and 5.x before 5.3 does not properly validate session-timeout values, which might make it easier for remote attackers to execute arbitrary code by leveraging an unattended workstation.

Mitigation
Install update from vendor's website.

Vulnerable software versions

VPLEX GeoSynchrony: 4.0 - 5.2.1


External links
https://archives.neohapsis.com/archives/bugtraq/2014-03/0157.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability