This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU62047
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-200 - Information Exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote attacker on the local network can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsRAX80: before 1.0.3.106
RAX75: before 1.0.3.106
D6220: before 1.0.0.66
D6400: before 1.0.0.100
D8500: before 1.0.3.58
DC112A: before 1.0.0.52
DGN2200Bv4: before 1.0.0.118
DGN2200v4: before 1.0.0.118
EX3700: before 1.0.0.94
EX6120: before 1.0.0.64
EX6130: before 1.0.0.44
EX7500: before 1.0.0.72
R6400: before 1.0.1.70
R6400v2: before 1.0.4.106
R7000: before 1.0.11.116
R7000P: before 1.3.3.140
R7900: before 1.0.4.38
R7960P: before 1.4.1.66
R8000: before 1.0.4.66
R8000P: before 1.4.1.66
R8500: before 1.0.2.144
RAX200: before 1.0.3.106
RBS40V: before 2.6.2.4
RBW30: before 2.6.2.2
RS400: before 1.5.1.80
WNDR3400v3: before 1.0.1.38
XR300: before 1.0.3.50
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.