Vulnerability identifier: #VU96638
Vulnerability risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
PowerEdge R740
Hardware solutions /
Firmware
PowerEdge R740XD
Hardware solutions /
Firmware
PowerEdge R640
Hardware solutions /
Firmware
PowerEdge R940
Hardware solutions /
Firmware
PowerEdge R540
Hardware solutions /
Firmware
PowerEdge R440
Hardware solutions /
Firmware
PowerEdge T440
Hardware solutions /
Firmware
PowerEdge XR2
Hardware solutions /
Firmware
PowerEdge R740XD2
Hardware solutions /
Firmware
PowerEdge R840
Hardware solutions /
Firmware
PowerEdge R940XA
Hardware solutions /
Firmware
PowerEdge T640
Hardware solutions /
Firmware
PowerEdge C6420
Hardware solutions /
Firmware
PowerEdge FC640
Hardware solutions /
Firmware
PowerEdge M640
Hardware solutions /
Firmware
PowerEdge M640 (for PE VRTX)
Hardware solutions /
Firmware
PowerEdge MX740C
Hardware solutions /
Firmware
PowerEdge MX840C
Hardware solutions /
Firmware
PowerEdge C4140
Hardware solutions /
Firmware
DSS 8440
Hardware solutions /
Firmware
PowerEdge XE2420
Hardware solutions /
Firmware
PowerEdge XE7420
Hardware solutions /
Firmware
PowerEdge XE7440
Hardware solutions /
Firmware
Dell EMC Storage NX3240
Hardware solutions /
Firmware
Dell EMC Storage NX3340
Hardware solutions /
Firmware
Dell EMC XC Core 6420 System
Hardware solutions /
Firmware
Dell EMC XC Core XC640 System
Hardware solutions /
Firmware
Dell EMC XC Core XC740xd System
Hardware solutions /
Firmware
Dell EMC XC Core XC740xd2
Hardware solutions /
Firmware
Dell EMC XC Core XC940 System
Hardware solutions /
Firmware
Dell EMC XC Core XCXR2
Hardware solutions /
Firmware
Vendor:
Description
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input. A local user can gain access to sensitive information.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.