Privilege escalation in Dell EMC Secure Remote Services



Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2018-11079
CVE-2018-11080
CVE-2018-15765
CWE-ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
EMC Secure Remote Services
Web applications / Remote management & hosting panels

Vendor Dell

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Privilege escalation

EUVDB-ID: #VU15387

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-11079

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to the system stores plaintext passwords in a configuration file. A local attacker can gain elevated privileges.

Mitigation

Update to version 3.32.00.08 or later.

Vulnerable software versions

EMC Secure Remote Services: 3.0 - 3.20

CPE2.3 External links

https://seclists.org/fulldisclosure/2018/Oct/35


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Privilege escalation

EUVDB-ID: #VU15386

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-11080

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to the system includes several configuration files with world-readable permissions. A local attacker can modify the contents to gain elevated privileges.

Mitigation

Update to version 3.32.00.08 or later.

Vulnerable software versions

EMC Secure Remote Services: 3.0 - 3.20

CPE2.3 External links

https://seclists.org/fulldisclosure/2018/Oct/35


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Privilege escalation

EUVDB-ID: #VU15388

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-15765

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to the system stores potentially sensitive information as log file contents. A local attacker can gain elevated privileges.

Mitigation

Update to version 3.32.00.08 or later.

Vulnerable software versions

EMC Secure Remote Services: 3.0 - 3.20

CPE2.3 External links

https://seclists.org/fulldisclosure/2018/Oct/35


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###