Multiple vulnerabilities in Dell EMC RecoverPoint



Published: 2018-05-23
Risk High
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2018-1235
CVE-2018-1242
CVE-2018-1241
CWE-ID CWE-264
CWE-200
CWE-259
CWE-300
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
RecoverPoint
Client/Desktop applications / Multimedia software

Vendor Dell

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Remote code execution

EUVDB-ID: #VU12995

Risk: High

CVSSv3.1: 8.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2018-1235

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to unspecified flaw. A remote attacker who has visibility of RecoverPoint on the network can execute arbitrary code on the underlying Linux operating system with root privileges.


Mitigation

Update to version 5.1.2 or 5.1.1.3.

Vulnerable software versions

RecoverPoint: All versions

External links

http://www.foregenix.com/blog/foregenix-identify-multiple-dellemc-recoverpoint-zero-day-vulnerabili...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Information disclosure

EUVDB-ID: #VU12997

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1242

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to unspecified flaw. A remote attacker with access to the boxmgmt administrative menu can use the ssh command when logging in as boxmgmt and running an internal command and display the contents of files from the file system which are accessible to the boxmgmt user.

Mitigation

Update to version 5.1.2 or 5.1.1.3.

Vulnerable software versions

RecoverPoint: All versions

External links

http://www.foregenix.com/blog/foregenix-identify-multiple-dellemc-recoverpoint-zero-day-vulnerabili...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Information disclosure

EUVDB-ID: #VU12998

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1241

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to LDAP credentials are leaked into the tomcat.log file when the LDAP server is not contactable by RecoverPoint, and a log in attempt is made to an LDAP linked account via a RecoverPoint web interface. A remote attacker with access to the RecoverPoint file system can obtain LDAP credentials and compromise the LDAP account.

Mitigation

Update to version 5.1.2 or 5.1.1.3.

Vulnerable software versions

RecoverPoint: All versions

External links

http://www.foregenix.com/blog/foregenix-identify-multiple-dellemc-recoverpoint-zero-day-vulnerabili...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Information disclosure

EUVDB-ID: #VU12999

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to the file /distribution.log (and /home/kos/kbox/src/installation/distribution/kdist.pl) contains "root" password hashes for grub. A remote attacker can read system password.

Mitigation

Update to version 5.1.2 or 5.1.1.3.

Vulnerable software versions

RecoverPoint: All versions

External links

http://www.foregenix.com/blog/foregenix-identify-multiple-dellemc-recoverpoint-zero-day-vulnerabili...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Privilege escalation

EUVDB-ID: #VU13000

Risk: Low

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-259 - Use of Hard-coded Password

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to the root account password for RecoverPoint's underlying linux operating system is a hardcoded password set. A remote attacker with knowledge of the root password of one device can log in at the local console, gain root privileges and control over all of the devices.

Mitigation

Update to version 5.1.2 or 5.1.1.3.

Vulnerable software versions

RecoverPoint: All versions

External links

http://www.foregenix.com/blog/foregenix-identify-multiple-dellemc-recoverpoint-zero-day-vulnerabili...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Man-in-the-middle attack

EUVDB-ID: #VU13001

Risk: Low

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-300 - Channel Accessible by Non-Endpoint ('Man-in-the-Middle')

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to credentials are sent from the RecoverPoint server in cleartext when the LDAP simple bind configuration is used. A remote attacker can conduct man-in-the-middle attack, monitor the traffic and discover LDAP credentials which have been entrusted to the RecoverPoint and compromise a Microsoft Active Directory domain.

Mitigation

Update to version 5.1.2 or 5.1.1.3.

Vulnerable software versions

RecoverPoint: All versions

External links

http://www.foregenix.com/blog/foregenix-identify-multiple-dellemc-recoverpoint-zero-day-vulnerabili...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###