#VU7392 Security restrictions bypass in EMC ESRS Policy Manager - CVE-2017-4976


Vulnerability identifier: #VU7392

Vulnerability risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2017-4976

CWE-ID: CWE-264

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
EMC ESRS Policy Manager
Client/Desktop applications / Other client software

Vendor: Dell

Description
The vulnerability allows an adjacent attacker to bypass security restrictions.

The weakness exists due to use of default password by an undocumented account ('OpenDS admin').A remote attacker with the knowledge of the default password may login to the system and gain administrator privileges on the local LDAP directory server.

Successful exploitation of the vulnerability results in full access to the affected system.

Mitigation
Update to version 6.8.

Vulnerable software versions

EMC ESRS Policy Manager: 6.6


External links
https://seclists.org/fulldisclosure/2017/Jul/13


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability