Information disclosure in EMC NetWorker



Published: 2018-07-31
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-11050
CWE-ID CWE-312
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
EMC NetWorker Server
Server applications / Other server solutions

Vendor Dell

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU14127

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11050

CWE-ID: CWE-312 - Cleartext Storage of Sensitive Information

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to obtain potentially sensitive information.

The vulnerability exists due to a flaw in the Rabbit MQ Advanced Message Queuing Protocol (AMQP) component. A remote attacker monitoring the local network collision domain can obtain clear text passwords that are sent to the remote AMQP service and access the target component with the privileges of the target user.

Mitigation

The vulnerability has been addressed in the versions 9.1.1.9, 9.2.1.4, 18.1.0.2.

Vulnerable software versions

EMC NetWorker Server: 9.0.0.0 - 18.1.0.1

External links

http://seclists.org/fulldisclosure/2018/Jul/92


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###