Vulnerability identifier: #VU7392
Vulnerability risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2017-4976
CWE-ID:
CWE-264
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
EMC ESRS Policy Manager
Client/Desktop applications /
Other client software
Vendor: Dell
Description
The vulnerability allows an adjacent attacker to bypass security restrictions.
The weakness exists due to use of default password by an undocumented account ('OpenDS admin').A remote attacker with the knowledge of the default password may login to the system and gain administrator privileges on the local LDAP directory server.
Successful exploitation of the vulnerability results in full access to the affected system.
Mitigation
Update to version 6.8.
Vulnerable software versions
EMC ESRS Policy Manager: 6.6
External links
https://seclists.org/fulldisclosure/2017/Jul/13
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.