SB2018052314 - Multiple vulnerabilities in Dell EMC RecoverPoint



SB2018052314 - Multiple vulnerabilities in Dell EMC RecoverPoint

Published: May 23, 2018

Security Bulletin ID SB2018052314
Severity
High
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 17% Low 83%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Remote code execution (CVE-ID: CVE-2018-1235)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to unspecified flaw. A remote attacker who has visibility of RecoverPoint on the network can execute arbitrary code on the underlying Linux operating system with root privileges.



2) Information disclosure (CVE-ID: CVE-2018-1242)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to unspecified flaw. A remote attacker with access to the boxmgmt administrative menu can use the ssh command when logging in as boxmgmt and running an internal command and display the contents of files from the file system which are accessible to the boxmgmt user.

3) Information disclosure (CVE-ID: CVE-2018-1241)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to LDAP credentials are leaked into the tomcat.log file when the LDAP server is not contactable by RecoverPoint, and a log in attempt is made to an LDAP linked account via a RecoverPoint web interface. A remote attacker with access to the RecoverPoint file system can obtain LDAP credentials and compromise the LDAP account.

4) Information disclosure (CVE-ID: N/A)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to the file /distribution.log (and /home/kos/kbox/src/installation/distribution/kdist.pl) contains "root" password hashes for grub. A remote attacker can read system password.

5) Privilege escalation (CVE-ID: N/A)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to the root account password for RecoverPoint's underlying linux operating system is a hardcoded password set. A remote attacker with knowledge of the root password of one device can log in at the local console, gain root privileges and control over all of the devices.

6) Man-in-the-middle attack (CVE-ID: N/A)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to credentials are sent from the RecoverPoint server in cleartext when the LDAP simple bind configuration is used. A remote attacker can conduct man-in-the-middle attack, monitor the traffic and discover LDAP credentials which have been entrusted to the RecoverPoint and compromise a Microsoft Active Directory domain.

Remediation

Install update from vendor's website.