Multiple vulnerabilities in DELL Secure Connect Gateway Security



| Updated: 2024-10-25
Risk Critical
Patch available YES
Number of vulnerabilities 167
CVE-ID CVE-2022-0850
CVE-2022-0002
CVE-2022-0487
CVE-2022-0492
CVE-2022-0617
CVE-2022-0644
CVE-2022-0812
CVE-2022-0847
CVE-2022-1011
CVE-2021-45868
CVE-2022-1016
CVE-2022-1048
CVE-2022-1280
CVE-2022-1353
CVE-2022-1419
CVE-2022-1516
CVE-2022-23036
CVE-2022-23037
CVE-2022-0001
CVE-2021-44879
CVE-2022-23039
CVE-2022-21349
CVE-2022-21293
CVE-2022-21294
CVE-2022-21296
CVE-2022-21299
CVE-2022-21305
CVE-2022-21340
CVE-2022-21341
CVE-2022-21360
CVE-2021-43389
CVE-2022-21365
CVE-2017-7658
CVE-2018-7755
CVE-2019-20811
CVE-2021-20292
CVE-2021-20321
CVE-2021-38208
CVE-2021-39713
CVE-2022-23038
CVE-2022-23040
CVE-2022-21283
CVE-2021-3737
CVE-2022-24407
CVE-2017-16932
CVE-2022-29824
CVE-2022-23308
CVE-2021-4104
CVE-2021-3572
CVE-2021-3733
CVE-2021-4189
CVE-2019-20838
CVE-2022-0391
CVE-2022-29155
CVE-2020-25613
CVE-2021-31799
CVE-2021-31810
CVE-2021-32066
CVE-2018-25032
CVE-2022-1552
CVE-2020-14155
CVE-2017-7246
CVE-2022-23041
CVE-2022-28388
CVE-2022-23042
CVE-2022-23960
CVE-2022-24448
CVE-2022-24959
CVE-2022-26490
CVE-2022-26966
CVE-2022-27666
CVE-2022-28356
CVE-2022-28389
CVE-2017-7245
CVE-2022-28390
CVE-2022-28748
CVE-2021-28153
CVE-2022-0778
CVE-2021-43618
CVE-2017-7186
CVE-2017-7244
CVE-2022-21291
CVE-2022-21282
CVE-2017-3167
CVE-2020-1927
CVE-2019-0217
CVE-2019-0220
CVE-2019-9517
CVE-2019-10081
CVE-2019-10082
CVE-2019-10092
CVE-2019-10098
CVE-2020-1934
CVE-2020-1938
CVE-2020-9490
CVE-2020-11993
CVE-2020-35452
CVE-2021-26690
CVE-2021-26691
CVE-2021-30641
CVE-2021-33193
CVE-2021-34798
CVE-2019-0211
CVE-2019-0197
CVE-2021-40438
CVE-2017-15715
CVE-2017-3169
CVE-2017-7659
CVE-2017-7679
CVE-2017-9788
CVE-2017-9789
CVE-2017-9798
CVE-2017-15710
CVE-2018-1283
CVE-2019-0196
CVE-2018-1301
CVE-2018-1302
CVE-2018-1303
CVE-2018-1312
CVE-2018-1333
CVE-2018-11763
CVE-2018-17189
CVE-2018-17199
CVE-2021-39275
CVE-2021-44224
CVE-2022-21248
CVE-2022-25235
CVE-2021-41103
CVE-2021-41190
CVE-2022-23648
CVE-2022-22576
CVE-2022-27776
CVE-2022-27781
CVE-2022-27782
CVE-2022-25236
CVE-2021-41091
CVE-2022-25313
CVE-2022-25314
CVE-2022-25315
CVE-2022-1304
CVE-2021-3999
CVE-2022-23218
CVE-2022-23219
CVE-2022-1271
CVE-2021-41092
CVE-2021-41089
CVE-2021-44790
CVE-2019-12423
CVE-2022-22719
CVE-2022-22720
CVE-2022-22721
CVE-2022-23943
CVE-2014-0230
CVE-2016-5388
CVE-2016-8745
CVE-2017-5647
CVE-2019-17566
CVE-2021-44142
CVE-2020-11987
CVE-2020-11988
CVE-2021-41079
CVE-2022-27772
CVE-2020-25721
CVE-2020-29361
CVE-2021-43566
CVE-2021-44141
CVE-2021-3800
CWE-ID CWE-200
CWE-416
CWE-264
CWE-476
CWE-617
CWE-908
CWE-362
CWE-20
CWE-129
CWE-444
CWE-254
CWE-835
CWE-89
CWE-400
CWE-190
CWE-502
CWE-399
CWE-918
CWE-125
CWE-93
CWE-77
CWE-295
CWE-119
CWE-121
CWE-415
CWE-1037
CWE-909
CWE-401
CWE-122
CWE-61
CWE-592
CWE-601
CWE-787
CWE-79
CWE-457
CWE-22
CWE-284
CWE-94
CWE-276
CWE-843
CWE-287
CWE-303
CWE-281
CWE-193
CWE-522
CWE-668
CWE-59
Exploitation vector Network
Public exploit Public exploit code for vulnerability #3 is available.
Public exploit code for vulnerability #4 is available.
Vulnerability #8 is being exploited in the wild.
Public exploit code for vulnerability #9 is available.
Public exploit code for vulnerability #55 is available.
Public exploit code for vulnerability #71 is available.
Public exploit code for vulnerability #78 is available.
Public exploit code for vulnerability #92 is available.
Vulnerability #94 is being exploited in the wild.
Vulnerability #103 is being exploited in the wild.
Vulnerability #105 is being exploited in the wild.
Public exploit code for vulnerability #107 is available.
Public exploit code for vulnerability #109 is available.
Public exploit code for vulnerability #112 is available.
Public exploit code for vulnerability #130 is available.
Public exploit code for vulnerability #136 is available.
Public exploit code for vulnerability #147 is available.
Public exploit code for vulnerability #158 is available.
Vulnerable software
Dell Secure Connect Gateway
Server applications / Other server solutions

Vendor Dell

Security Bulletin

This security bulletin contains information about 167 vulnerabilities.

1) Information disclosure

EUVDB-ID: #VU63423

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0850

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in the copy_page_to_iter() function in iov_iter.c in Linux kernel. A local user can gain unauthorized access to sensitive information on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

EUVDB-ID: #VU61199

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0002

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to non-transparent sharing of branch predictor within a context. A local user can gain unauthorized access to sensitive information on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU61181

Risk: Low

CVSSv3.1: 5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-0487

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a use-after-free error in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. A local user can trigger a use-after-free error and gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

4) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU61245

Risk: Low

CVSSv3.1: 7.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2022-0492

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a logic error within the cgroup_release_agent_write() function in  kernel/cgroup/cgroup-v1.c. A local user can use the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.

5) NULL pointer dereference

EUVDB-ID: #VU61210

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0617

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the Linux kernel UDF file system functionality. A local user can supply a malicious UDF image to the udf_file_write_iter() function and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Reachable Assertion

EUVDB-ID: #VU63860

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0644

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion error in the Linux kernel’s kernel_read_file_from_fd in the filesystem. A local user can attempt to read a file without read access/permission to perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Information disclosure

EUVDB-ID: #VU64919

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0812

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c() function in RPCRDMA_HDRLEN_MIN (7). A local user can gain unauthorized access to sensitive information on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use of uninitialized resource

EUVDB-ID: #VU61110

Risk: Low

CVSSv3.1: 8.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2022-0847

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to usage of an uninitialized resources. A local user can overwrite arbitrary file in the page cache, even if the file is read-only, and execute arbitrary code on the system with elevated privileges.

The vulnerability was dubbed Dirty Pipe.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

9) Use-after-free

EUVDB-ID: #VU63386

Risk: Low

CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-1011

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in the write() function of FUSE filesystem. A local user can retireve (partial) /etc/shadow hashes and execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

10) Use-after-free

EUVDB-ID: #VU63422

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-45868

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial-of-service attack.

The vulnerability exists due to fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). A local user can trigger use-after-free error and perform a denial-of-service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU62028

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1016

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a use-after-free error in net/netfilter/nf_tables_core.c:nft_do_chain in Linux kernel.. A local user can trigger a use-after-free error and gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free

EUVDB-ID: #VU63428

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1048

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code with elevated privileges.

The vulnerability exists due to a use-after-free error in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. A local user can execute arbitrary code with elevated privileges and perform a denial-of-service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Use-after-free

EUVDB-ID: #VU62358

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1280

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a use-after-free error within the drm_lease_held() function in drivers/gpu/drm/drm_lease.c in the Linux kernel. A local user can run a specially crafted program to trigger a use-after-free error and crash the kernel or gain access to sensitive information.


Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Information disclosure

EUVDB-ID: #VU63388

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1353

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in the pfkey_register function in net/key/af_key.c in the Linux kernel. A local user can gain unauthorized access to kernel memory, leading to a system crash or a leak of internal kernel information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Use-after-free

EUVDB-ID: #VU63418

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1419

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in vgem_gem_dumb_create() function in Linux kernel. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) NULL pointer dereference

EUVDB-ID: #VU63158

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1516

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference error in the Linux kernel’s X.25 set of standardized network protocols functionality. A local user can terminate session using a simulated Ethernet card and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Race condition

EUVDB-ID: #VU63305

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23036

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in the blkfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Race condition

EUVDB-ID: #VU63306

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23037

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in the netfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Information disclosure

EUVDB-ID: #VU61198

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0001

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to non-transparent sharing of branch predictor selectors between contexts. A local user can gain unauthorized access to sensitive information on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) NULL pointer dereference

EUVDB-ID: #VU62483

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-44879

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the gc_data_segment() function in fs/f2fs/gc.c. A local user can mount a specially crafted f2fs image, trigger a NULL pointer dereference and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Race condition

EUVDB-ID: #VU63308

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23039

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in the gntalloc ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Improper input validation

EUVDB-ID: #VU59718

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21349

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the 2D component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Improper input validation

EUVDB-ID: #VU59730

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21293

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Improper input validation

EUVDB-ID: #VU59731

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21294

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Improper input validation

EUVDB-ID: #VU59726

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21296

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation within the JAXP component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Improper input validation

EUVDB-ID: #VU59727

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21299

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the JAXP component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Improper input validation

EUVDB-ID: #VU59720

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21305

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Improper input validation

EUVDB-ID: #VU59732

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21340

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Improper input validation

EUVDB-ID: #VU59733

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21341

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Serialization component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Improper input validation

EUVDB-ID: #VU59722

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21360

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the ImageIO component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Improper Validation of Array Index

EUVDB-ID: #VU63385

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-43389

CWE-ID: CWE-129 - Improper Validation of Array Index

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code with elevated privileges.

The vulnerability exists due to improper validation of array index in the ISDN CAPI implementation within detach_capi_ctr() function in drivers/isdn/capi/kcapi.c. local user can send specially crafted data to the system and execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Improper input validation

EUVDB-ID: #VU59723

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21365

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the ImageIO component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) HTTP request smuggling attack

EUVDB-ID: #VU13529

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7658

CWE-ID: CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to conduct an HTTP request smuggling attack on the target system.

The vulnerability exists due to improper handling HTTP requests that contain more than one content-length header. A remote attacker can send a specially crafted HTTP request that contains a transfer-encoding header and a content-length header, cause the software and an upstream HTTP agent to misinterpret the boundary of the request and to poison the web cache on the system, which could be used to conduct further attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Security restrictions bypass

EUVDB-ID: #VU10918

Risk: Low

CVSSv3.1: 3.5 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-7755

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local unauthenticated attacker to bypass security restrictions on the target system.

The weakness exists in the drivers/block/floppy.c source code in the fd_locked_ioctl function due to insufficient security restrictions. A local attacker can bypass security restrictions through the system floppy drive and obtain kernel code and data from the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Input validation error

EUVDB-ID: #VU34374

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-20811

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local authenticated user to manipulate data.

An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Use-after-free

EUVDB-ID: #VU63382

Risk: Low

CVSSv3.1: 7.1 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-20292

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges.

The vulnerability exists due to a use-after-free error in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. A local user can escalate privileges and execute code in the context of the kernel.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Race condition

EUVDB-ID: #VU59084

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-20321

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attacks.

The vulnerability exists due to a race condition when accessing file object in the Linux kernel OverlayFS subsystem. A local user can rename files in specific way with OverlayFS and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) NULL pointer dereference

EUVDB-ID: #VU63383

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-38208

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the net/nfc/llcp_sock.c component. A remote attacker can make getsockname call and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Security features bypass

EUVDB-ID: #VU63350

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-39713

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to multiple issues in Qdisc implementation related to rcu read lock. A local application can execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Race condition

EUVDB-ID: #VU63307

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23038

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in the scsifront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Race condition

EUVDB-ID: #VU63309

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23040

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in the xenbus ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Improper input validation

EUVDB-ID: #VU59729

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21283

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Infinite loop

EUVDB-ID: #VU59089

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3737

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop. A remote attacker who controls a malicious server can force the client to enter an infinite loop on a 100 Continue response.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) SQL injection

EUVDB-ID: #VU60842

Risk: High

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24407

CWE-ID: CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of password in the SQL plugin shipped with Cyrus SASL. A remote non-authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Resource exhaustion

EUVDB-ID: #VU9542

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16932

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in parser.c function due to improper handling of certain parameter entities. A remote attacker can supply specially constructed XML data, trigger resource exhaustion and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Integer overflow

EUVDB-ID: #VU62741

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-29824

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*). A remote attacker can pass specially crafted multi-gigabyte XML file to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Use-after-free

EUVDB-ID: #VU60922

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23308

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing ID and IDREF attributes in valid.c. A remote attacker can pass specially crafted XML input to the application, trigger a use-after-free error and crash the application or execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Deserialization of Untrusted Data

EUVDB-ID: #VU58977

Risk: Medium

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-4104

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data in JMSAppender, when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution.

Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Improper input validation

EUVDB-ID: #VU62512

Risk: Medium

CVSSv3.1: 5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3572

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote authenticated user to manipulate data.

The vulnerability exists due to improper input validation within the Policy (python-pip) component in Oracle Communications Cloud Native Core Policy. A remote authenticated user can exploit this vulnerability to manipulate data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Resource management error

EUVDB-ID: #VU58295

Risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3733

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the application within the AbstractBasicAuthHandler class in urllib. A remote attacker with control over the server can perform regular expression denial of service attack during authentication.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Server-Side Request Forgery (SSRF)

EUVDB-ID: #VU61681

Risk: Medium

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-4189

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input in the FTP (File Transfer Protocol) client library when using it in PASV (passive) mode. A remote attacker can set up a malicious FTP server, trick the FTP client in Python into connecting back to a given IP address and port, which can lead to FTP client scanning ports which otherwise would not have been possible.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Out-of-bounds read

EUVDB-ID: #VU30256

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-20838

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and X or R has more than one fixed quantifier, a related issue to CVE-2019-20454.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) CRLF injection

EUVDB-ID: #VU61675

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0391

CWE-ID: CWE-93 - Improper Neutralization of CRLF Sequences ('CRLF Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to inject arbitrary data in server response.

The vulnerability exists due to insufficient validation of attacker-supplied data within the urllib.parse module in Python. A remote attacker can pass specially crafted data to the application containing CR-LF characters and modify application behavior.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) SQL injection

EUVDB-ID: #VU63343

Risk: High

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-29155

CWE-ID: CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in the experimental back-sql backend to slapd during an LDAP search operation when the search filter is processed. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Inconsistent interpretation of HTTP requests

EUVDB-ID: #VU47333

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2020-25613

CWE-ID: CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to preform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

56) Command Injection

EUVDB-ID: #VU52796

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-31799

CWE-ID: CWE-77 - Command injection

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to improper input validation. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Information disclosure

EUVDB-ID: #VU55488

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-31810

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists within Net::FTP in Ruby when processing PASV responses. A remote attacker can trick the victim to connect to a malicious FTP server and trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Improper Certificate Validation

EUVDB-ID: #VU55489

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-32066

CWE-ID: CWE-295 - Improper Certificate Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists in Net::IMAP in Ruby, due to the gem does not raise an exception when StartTLS fails with an an unknown response. A remote attacker can perform a man-in-the-middle (MitM) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Buffer overflow

EUVDB-ID: #VU61671

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-25032

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when compressing data. A remote attacker can pass specially crafted input to the application, trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU63126

Risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1552

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote user to bypass implemented security restrictions.

The vulnerability exists due to incorrectly imposed security restrictions in Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck. A remote authenticated user with permission to create non-temp objects can execute arbitrary SQL functions under a superuser identity and escalate privileges within the application.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Integer overflow

EUVDB-ID: #VU29488

Risk: High

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-14155

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow. A remote attacker can pass a large number after a (?C substring, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Buffer overflow

EUVDB-ID: #VU7567

Risk: Medium

CVSSv3.1: 7.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7246

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in pcre32_copy_substring() function in pcre_get.c in libpcre1 in PCRE 8.40. A remote unauthenticated attacker can create a specially crafted file, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Race condition

EUVDB-ID: #VU63310

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23041

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls ring buffers. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) Double Free

EUVDB-ID: #VU63160

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-28388

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code with elevated privileges.

The vulnerability exists due to boundary error in the usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c. A local user can pass specially crafted data to the application, trigger double free error and execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Reachable Assertion

EUVDB-ID: #VU63311

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23042

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to reachable assertion in the netfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Processor optimization removal or modification of security-critical code

EUVDB-ID: #VU65007

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23960

CWE-ID: CWE-1037 - Processor optimization removal or modification of security-critical code

Exploit availability: No

Description

The vulnerability allows a local user to obtain potentially sensitive information.

The vulnerability exists due to improper restrictions of cache speculation. A local user can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches and gain access to sensitive information.

The vulnerability was dubbed Spectre-BHB.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Missing initialization of resource

EUVDB-ID: #VU61211

Risk: Low

CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24448

CWE-ID: CWE-909 - Missing initialization of resource

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to missing initialization of resource within the fs/nfs/dir.c in the Linux kernel. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Memory leak

EUVDB-ID: #VU62482

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24959

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the yam_siocdevprivate() function in drivers/net/hamradio/yam.c. A local user can perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Buffer overflow

EUVDB-ID: #VU62601

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-26490

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the st21nfca_connectivity_event_received() function in drivers/nfc/st21nfca/se.c in Linux kernel. A local user can run a specially crafted program to trigger buffer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Use-after-free

EUVDB-ID: #VU63318

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-26966

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a use-after-free error in drivers/net/usb/sr9700.c in the Linux kernel. A remote attacker can pass specially crafted data and obtain sensitive information from heap memory.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Heap-based buffer overflow

EUVDB-ID: #VU61672

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-27666

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c in Linux kernel. A local unprivileged user can pass specially crafted data to the system, trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

72) Memory leak

EUVDB-ID: #VU63390

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-28356

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak in net/llc/af_llc.c component. A remote attacker can force the system to leak memory and perform denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Double Free

EUVDB-ID: #VU63162

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-28389

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code with elevated privileges.

The vulnerability exists due to boundary error in mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c. A local user can pass specially crafted data to the application, trigger double free error and execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Buffer overflow

EUVDB-ID: #VU7566

Risk: Medium

CVSSv3.1: 7.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7245

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in pcre32_copy_substring() function in pcre_get.c in libpcre1 in PCRE 8.40. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Double Free

EUVDB-ID: #VU63164

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-28390

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code with elevated privileges.

The vulnerability exists due to boundary error in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c. A local user can pass specially crafted data to the application, trigger double free error and execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Memory leak

EUVDB-ID: #VU63419

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-28748

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due memory leak when working with ax88179_178a devices. An attacker with physical access to the system can inject a malicious USB-drive and remotely obtain data from kernel memory.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) UNIX symbolic link following

EUVDB-ID: #VU51454

Risk: Low

CVSSv3.1: 2.2 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-28153

CWE-ID: CWE-61 - UNIX Symbolic Link (Symlink) Following

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a symlink following issue, when g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.

Successful exploitation of this vulnerability may result in privilege escalation.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) Infinite loop

EUVDB-ID: #VU61391

Risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-0778

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the BN_mod_sqrt() function when processing an ASN.1 certificate that contains elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. A remote attacker can supply a specially crafted certificate to the TLS server or client, consume all available system resources and cause denial of service conditions.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

79) Integer overflow

EUVDB-ID: #VU63553

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-43618

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow in mpz/inp_raw.c. A remote attacker can pass specially crafted data to the application, trigger integer overflow and cause a denial of service condition on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Out-of-bounds read

EUVDB-ID: #VU7564

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7186

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to a segmentation violation issue by the libpcre1 and libpcre2. A remote attacker can send specially crafted packets and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Out-of-bounds read

EUVDB-ID: #VU7565

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7244

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to invalid memory read flaw in the _pcre32_xclass function in pcre_xclass.c. A remote attacker can trick the victim into loading a specially crafted file and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Improper input validation

EUVDB-ID: #VU59719

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21291

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Improper input validation

EUVDB-ID: #VU59725

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21282

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation within the JAXP component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) Authentication bypass

EUVDB-ID: #VU7115

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3167

CWE-ID: CWE-592 - Authentication Bypass Issues

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to usage of the ap_get_basic_auth_pw() function by third-party modules outside of the authentication phase. A remote attacker can create a specially crafted HTTP request to vulnerable web server, bypass authentication requirements and gain unauthorized access to otherwise protected information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) Open redirect

EUVDB-ID: #VU26527

Risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-1927

CWE-ID: CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')

Exploit availability: No

Description

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data in some "mod_rewrite" configurations. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Race condition

EUVDB-ID: #VU18111

Risk: Low

CVSSv3.1: 5.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-0217

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote authenticated user to impersonate other users.

The vulnerability exists due to a race condition within the mod_auth_digests module. A remote authenticated attacker can send a series of requests and impersonate other users under a threaded MPM.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Input validation error

EUVDB-ID: #VU18113

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-0220

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to the web server does not merge consecutive slashes in URLs, that can lead to incorrect processing of requests when accessing CGI programs. Such web server behavior may lead to security restrictions bypass.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) Resource management error

EUVDB-ID: #VU20340

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-9517

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect implementation of HTTP/2 protocol. A remote attacker can  open the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Out-of-bounds write

EUVDB-ID: #VU20373

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-10081

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform denial of service attack.

The vulnerability exists due to a boundary error when processing HTTP/2 requests within the mod_http2 module, configured with "H2PushResource". A remote attacker can send specially crafted HTTP/2 requests to the affected server and perform denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) Use-after-free

EUVDB-ID: #VU20386

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-10082

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the mod_http2 when handling connection shutdown. A remote attacker can send specially crafted requests to the affected server and make the mod_http2 to read memory that was already freed.


Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Cross-site scripting

EUVDB-ID: #VU20384

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-10092

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data on the mod_proxy error page. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Input validation error

EUVDB-ID: #VU20374

Risk: Medium

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-10098

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to incorrect handling of encoded line break characters  within rewrite rules. A remote attacker can send a specially crafted HTTP request and potentially bypass security restrictions.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

93) Use of Uninitialized Variable

EUVDB-ID: #VU26528

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-1934

CWE-ID: CWE-457 - Use of Uninitialized Variable

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to the "mod_proxy_ftp" may use uninitialized memory when proxying to a malicious FTP server. A remote attacker can gain unauthorized access to sensitive information on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Path traversal

EUVDB-ID: #VU25502

Risk: High

CVSSv3.1: 9.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2020-1938

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in Apache Tomcat AJP connector. A remote attacker can send a specially crafted AJP request, include and execute arbitrary files on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

95) Input validation error

EUVDB-ID: #VU35880

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-9490

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when processing Cache-Digest header in HTTP/2 request. A remote attacker can pass specially crafted HTTP/2 request to the Apache HTTP Server, trigger the server to send the HTTP/2 PUSH and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) Resource management error

EUVDB-ID: #VU35854

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-11993

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the application while processing HTTP/2 requests with enabled trace/debug for HTTP/2 connections. A remote attacker can send specially crafted HTTP/2 requests to Apache HTTP Server and force it to make logging statements on wrong connection for certain traffic edge patterns. This results in concurrent use of memory pools for separate connections and triggers denial of service condition.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Stack-based buffer overflow

EUVDB-ID: #VU53775

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-35452

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing Digest nounces in mod_auth_digest. A remote unauthenticated attacker can send a specially crafted HTTP request, trigger stack overflow by one nul byte and crash the server.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) NULL pointer dereference

EUVDB-ID: #VU53777

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-26690

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in mod_session. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) NULL pointer dereference

EUVDB-ID: #VU53776

Risk: Low

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-26691

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in mod_session. A a malicious backend server or SessionHeader can trigger a denial of service (DoS) condition.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Input validation error

EUVDB-ID: #VU53774

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30641

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to incorrect parsing of Apache configuration files. An unexpected section could be matched with 'MergeSlashes OFF' option, leading to a potential security issue.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Inconsistent interpretation of HTTP requests

EUVDB-ID: #VU56474

Risk: Medium

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-33193

CWE-ID: CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Exploit availability: No

Description

The vulnerability allows a remote attacker to preform HTTP/2 request smuggling attacks.

The vulnerability exists due to improper validation of HTTP/2 requests in mod_proxy in Apache HTTP Server. A remote attacker can send a specially crafted HTTP/2 request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison web server cache and perform phishing attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) NULL pointer dereference

EUVDB-ID: #VU56681

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-34798

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can send a specially crafted HTTP request to the affected web server and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Privilege escalation

EUVDB-ID: #VU18110

Risk: Low

CVSSv3.1: 5.1 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:H/RL:O/RC:C]

CVE-ID: CVE-2019-0211

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists within MPM implementation due to the application does not properly maintain each child's listener bucket number in the scoreboard that may lead to unprivileged code or scripts run by server (e.g. via mod_php) to modify the scoreboard and abuse the privileged main process.

A local user can execute arbitrary code on the system with privileges of the Apache HTTP Server code process.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

104) Resource management error

EUVDB-ID: #VU18108

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-0197

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error within the mod_http2 module when processing update requests from http/1.1 to http/2, if this was not the first request on a connection. A remote attacker can send specially crafted requests to the affected server and perform denial of service attack.

Successful exploitation of the vulnerability requires that HTTP/2 protocol is enabled for a "http:" host or H2Upgrade is enabled for h2 on a "https:" host.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Server-Side Request Forgery (SSRF)

EUVDB-ID: #VU56678

Risk: High

CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N/E:H/RL:O/RC:C]

CVE-ID: CVE-2021-40438

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: Yes

Description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input within the mod_proxy module in Apache HTTP Server. A remote attacker can send a specially crafted HTTP request with a chosen uri-path and trick the web server to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

106) Security restrictions bypass

EUVDB-ID: #VU11284

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15715

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists on systems that allow uploading of user-specified filenames due to the '<FilesMatch>' expression may not correctly match characters in a filename. A remote attacker can supply a specially crafted filename to potentially bypass security controls that use the '<FilesMatch>' directive.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) NULL pointer dereference

EUVDB-ID: #VU7116

Risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-3169

CWE-ID: CWE-592 - Authentication Bypass Issues

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform denial of service attack.

The vulnerability exists due to a NULL pointer dereference error within mod_ssl module, when third-party modules call ap_hook_process_connection() function during an HTTP request to an HTTPS port. A remote attacker can send a specially crafted HTTP request and crash the affected web server.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

108) NULL pointer dereference

EUVDB-ID: #VU7118

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7659

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform denial of service attack.

The vulnerability exists due to a NULL pointer dereference error within mod_http2. A remote attacker can send a specially crafted HTTP/2 request and crash the affected process.

Successful exploitation of the vulnerability result in denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Out-of-bounds read

EUVDB-ID: #VU7119

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-7679

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to out-of-bounds read within the mod_mime when constructing Content-Type response header. A remote attacker read one byte pas the end of a buffer when sending a malicious Content-Type response header.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

110) Information disclosure

EUVDB-ID: #VU7517

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-9788

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information on the targeted system.

The weakness exists due to improper initialization of the value placeholder in [Proxy-]Authorization headers of type 'Digest' before or between successive key=value assignments by mod_auth_digest. A remote attacker can provide an initial key with no '=' assignment to cause the stale value of uninitialized pool memory used by the prior request to leak.

Successful exploitation of the vulnerability results in information disclosure.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Use-after-free error

EUVDB-ID: #VU7518

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-9789

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the targeted system.

The weakness exists due to use-after-free condition in the mod_http2 function. A remote attacker can trigger memory corruption and cause the server to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Use-after-free

EUVDB-ID: #VU8504

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:F/RL:O/RC:C]

CVE-ID: CVE-2017-9798

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to use-after-free error when processing HTTP OPTIONS requests in server/core.c, when limits are configured in .htaccess or httpd.conf configuration files. A remote unauthenticated attacker can read portions of memory through HTTP OPTIONS requests and gain access to potentially sensitive data.

The vulnerability is dubbed Optionsbleed.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.

113) Out-of-bounds write

EUVDB-ID: #VU11283

Risk: Medium

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15710

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in HTTPD mod_authnz_ldap due to improper validation of user-supplied input. A remote attacker can send a specially crafted Accept-Language header value, trigger an out-of-bounds memory write error and potentially cause the target service to crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) Improper access control

EUVDB-ID: #VU11282

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1283

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to modify data on the target system.

The weakness exists on systems with mod_session configured with SessionEnv on to forward session data to CGI applications due to improper input validation. A remote attacker can send a specially crafted 'Session' header value to potentially modify mod_session data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) Use-after-free

EUVDB-ID: #VU18109

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-0196

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform denial of service attack.

The vulnerability exists due to a use-after-free error within the mod_http2 module when processing HTTP/2 requests. A remote attacker can make the application to access freed memory during string comparison when determining the method of a request and process the request incorrectly.

Successful exploitation of the vulnerability may allow an attacker to gain access to sensitive information or perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) Out-of-bounds read

EUVDB-ID: #VU11281

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1301

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper validation of user-supplied input. A remote attacker can send a specially crafted HTTP request to trigger an out-of-bounds memory access error after a header size limit has been reached to cause the target service to crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) Null pointer dereference

EUVDB-ID: #VU11287

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1302

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper destruction of an HTTP/2 stream after being handled. A remote attacker can send a specially crafted HTTP/2 stream, write a NULL pointer value to an already freed memory space and cause the service to crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) Out-of-bounds read

EUVDB-ID: #VU11280

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1303

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in Apache HTTPD mod_cache_socache due to improper validation of user-supplied input. A remote attacker can send a specially crafted HTTP request header, trigger an out-of-bounds memory read error in mod_cache_socache and cause the target service to crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) Security restrictions bypass

EUVDB-ID: #VU11279

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1312

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists in Apache HTTPD mod_auth_digest due to improper generation of HTTP Digest authentication nonce. A remote attacker can replay HTTP requests across the cluster without detection by the target server(s) and bypass replay protection.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) Improper input validation

EUVDB-ID: #VU13908

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1333

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to insufficient filtering of incoming data within "mod_http2" apache module. A remote attacker can send a specially crafted HTTP request to the affected web server and trigger daemon crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) Resource management error

EUVDB-ID: #VU14913

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11763

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect handling of large SETTINGS frames in HTTP/2 connections. A remote attacker can repeatedly send large SETTINGS frames within an established HTTP/2 connection and consume all available threads and CPU time.

Successful exploitation of the vulnerability may allow an attacker to perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

122) Input validation error

EUVDB-ID: #VU17177

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-17189

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to an error when handling malicious input. A remote attacker can send a specially crafted request bodies in a slow loris way to plain resources and cause the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. 

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

123) Security restrictions bypass

EUVDB-ID: #VU17178

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-17199

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to mod_session checks the session expiry time before decoding the session. A remote attacker сan cause session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded and reuse old session credentials or session IDs, which the attacker could use to access web pages previously accessed by a targeted user. 

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

124) Buffer overflow

EUVDB-ID: #VU56679

Risk: Medium

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-39275

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system or perform a denial of service attack.

The vulnerability exists due to a boundary error within the ap_escape_quotes()  function. A remote attacker can send a specially crafted request to the web server, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires that the Apache module passes untrusted data to the affected function.

According to vendor, No included modules pass untrusted data to these functions

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

125) Server-Side Request Forgery (SSRF)

EUVDB-ID: #VU59057

Risk: Medium

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-44224

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input in forward proxy configurations. A remote attacker can send a specially crafted HTTP request and trick the web server to initiate requests to arbitrary systems or cause NULL pointer dereference error and crash the web server.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.

SSRF if possible for configuration that mix forward and reverse proxy.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

126) Improper input validation

EUVDB-ID: #VU59734

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21248

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The vulnerability exists due to improper input validation within the Serialization component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

127) Code Injection

EUVDB-ID: #VU60736

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-25235

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the affected application lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

128) Incorrect default permissions

EUVDB-ID: #VU57038

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41103

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for container root directories and some plugins. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host can discover, read, and modify those files.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

129) Type Confusion

EUVDB-ID: #VU58229

Risk: Low

CVSSv3.1: 2.6 [CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41190

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the system.

The vulnerability exists due to a type confusion error. A remote authenticated attacker can pass specially crafted data to the application, trigger a type confusion error and interpret the resulting content differently.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

130) Security restrictions bypass

EUVDB-ID: #VU60972

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-23648

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to an error when handling specially crafted image configuration in containerd where containers launched through containerd’s CRI implementation. A remote attacker can bypass any policy-based enforcement on container setup and access the read-only copies of arbitrary files and directories on the host.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

131) Improper Authentication

EUVDB-ID: #VU62640

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22576

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error when re-using OAUTH2 connections for SASL-enabled protocols, such as SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only). libcurl may reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. As a result, a connection that is successfully created and authenticated with a user name + OAUTH2 bearer can subsequently be erroneously reused even for user + [other OAUTH2 bearer], even though that might not even be a valid bearer.

A remote attacker can exploit this vulnerability against applications intended for use in multi-user environments to bypass authentication and gain unauthorized access to victim's accounts.


Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

132) Information disclosure

EUVDB-ID: #VU62644

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-27776

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to curl can leak authentication or cookie header data during HTTP redirects to the same host but another port number. When asked to send custom headers or cookies in its HTTP requests, curl sends that set of headers only to the host which name is used in the initial URL, so that redirects to other hosts will make curl send the data to those. However, due to a flawed check, curl wrongly also sends that same set of headers to the hosts that are identical to the first one but use a different port number or URL scheme.

The vulnerability exists due to an incomplete fix for #VU10224 (CVE-2018-1000007).

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

133) Infinite loop

EUVDB-ID: #VU63008

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-27781

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop when handling requests with the CURLOPT_CERTINFO option. A remote attacker can consume all available system resources and cause denial of service conditions.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

134) Incorrect Implementation of Authentication Algorithm

EUVDB-ID: #VU63009

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-27782

CWE-ID: CWE-303 - Incorrect Implementation of Authentication Algorithm

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the way libcurl handles previously used connections in a connection pool for subsequent transfers. Several TLS and SSH settings were left out from the configuration match checks, resulting in erroneous matches for different resources. As a result, libcurl can send authentication string from one resource to another, exposing credentials to a third-party.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

135) Input validation error

EUVDB-ID: #VU60733

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-25236

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper protection against insertion of namesep characters into namespace URIs in xmlparse.c. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

136) Improper Preservation of Permissions

EUVDB-ID: #VU64416

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C]

CVE-ID: CVE-2021-41091

CWE-ID: CWE-281 - Improper preservation of permissions

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

137) Stack-based buffer overflow

EUVDB-ID: #VU60737

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-25313

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in build_model. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

138) Integer overflow

EUVDB-ID: #VU60738

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-25314

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow in copyString. A remote attacker can pass specially crafted data to the application, trigger integer overflow and cause a denial of service condition on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

139) Integer overflow

EUVDB-ID: #VU60739

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-25315

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in storeRawNames function. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

140) Out-of-bounds write

EUVDB-ID: #VU64075

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1304

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input. A local attacker can use a specially crafted filesystem, trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

141) Off-by-one

EUVDB-ID: #VU61293

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3999

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to an off-by-one error glibc getcwd() function. A remote attacker can pass specially crafted input to the application that is using the affected library version, trigger an off-by-one error and execute arbitrary code on the target system.


Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

142) Buffer overflow

EUVDB-ID: #VU61294

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23218

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the svcunix_create() in the sunrpc module ib glibc. A remote attacker can pass specially crafted input to the application that is using the affected library version, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

143) Buffer overflow

EUVDB-ID: #VU61295

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23219

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the clnt_create() function in the sunrpc module. A remote attacker can pass specially crafted input to the application that is using the affected library version, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

144) Input validation error

EUVDB-ID: #VU62002

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1271

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation when processing filenames with two or more newlines. A remote attacker can force zgrep or xzgrep to write arbitrary files on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

145) Information disclosure

EUVDB-ID: #VU64417

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41092

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

146) Improper Preservation of Permissions

EUVDB-ID: #VU64415

Risk: Low

CVSSv3.1: 5.5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41089

CWE-ID: CWE-281 - Improper preservation of permissions

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

147) Buffer overflow

EUVDB-ID: #VU59056

Risk: Critical

CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2021-44790

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when parsing multipart content in mod_lua. A remote attacker can send a specially crafted HTTP request to the affected web server, trigger buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

148) Insufficiently protected credentials

EUVDB-ID: #VU27701

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-12423

CWE-ID: CWE-522 - Insufficiently Protected Credentials

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access ti sensitive information.

The vulnerability exists due to the application allows a client to obtain the keys from a JWK keystore file, by setting the configuration parameter "rs.security.keystore.type" to "jwk". A remote non-authenticated attacker can obtain all private key and secret key credentials and gain unauthorized access to the application.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

149) Input validation error

EUVDB-ID: #VU61287

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22719

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized value in r:parsebody. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

150) Inconsistent interpretation of HTTP requests

EUVDB-ID: #VU61286

Risk: Medium

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22720

CWE-ID: CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Exploit availability: No

Description

The vulnerability allows a remote attacker to preform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

151) Integer overflow

EUVDB-ID: #VU61285

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22721

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow within the ap_escape_html2() function when parsing LimitXMLRequestBody. A remote attacker can send a specially crafted request to the web server, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

152) Out-of-bounds write

EUVDB-ID: #VU61284

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23943

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in mod_sed. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

153) Resource management error

EUVDB-ID: #VU64581

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-0230

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to Apache Tomcat does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body. A remote attacker can cause a denial of service (thread consumption) via a series of aborted upload attempts.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

154) Improper access control

EUVDB-ID: #VU64586

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-5388

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable. A remote attacker can redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

155) Information disclosure

EUVDB-ID: #VU5449

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-8745

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists to error within the send file code for the NIO HTTP connector, which causes current Processor object being added to the Processor cache multiple times. This behavior means that sharing the same Processor for concurrent requests can lead to leakage of potentially sensitive information between requests, such as session ID, request body, etc.

Successful exploitation of the vulnerability may allow an attacker to obtain potentially sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

156) Information disclosure

EUVDB-ID: #VU6674

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5647

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists in the handling of the pipelined requests when send file was used resulted in the pipelined request being lost when send file processing of the previous request completed. A remote attacker can cause responses to appear to be sent for the wrong request.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

157) Server-Side Request Forgery (SSRF)

EUVDB-ID: #VU29068

Risk: Medium

CVSSv3.1: 5.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-17566

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of "xlink:href" attributes. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

158) Out-of-bounds write

EUVDB-ID: #VU60186

Risk: High

CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2021-44142

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing EA metadata while opening files in smbd within the VFS Samba module (vfs_fruit). A remote attacker with ability to write to file's extended attributes can trigger an out-of-bounds write and execute arbitrary code with root privileges.

Note, the vulnerability in vfs_fruit exists in the default configuration of the fruit VFS module using fruit:metadata=netatalk or fruit:resource=file.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

159) Server-Side Request Forgery (SSRF)

EUVDB-ID: #VU52501

Risk: Medium

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-11987

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

160) Server-Side Request Forgery (SSRF)

EUVDB-ID: #VU54291

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-11988

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input within the XMPParser in Apache XmlGraphics Commons. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

161) Infinite loop

EUVDB-ID: #VU56634

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41079

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop when processing certain TLS packets. A remote attacker can send a specially crafted packet to the application, consume all available system resources and cause denial of service conditions.

Successful exploitation of vulnerability requires that Apache Tomcat is configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

162) Exposure of Resource to Wrong Sphere

EUVDB-ID: #VU65829

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-27772

CWE-ID: CWE-668 - Exposure of resource to wrong sphere

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a temporary directory hijacking. A local user can trigger the vulnerability and escalate privileges on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

163) Improper Authentication

EUVDB-ID: #VU58094

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-25721

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. A remote attacker can bypass authentication process and gain unauthorized access to the application.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

164) Buffer overflow

EUVDB-ID: #VU48944

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-29361

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a unspecified boundary error, related to processing of RPC requests. A remote attacker can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

165) Link following

EUVDB-ID: #VU59345

Risk: Low

CVSSv3.1: 2.3 [CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-43566

CWE-ID: CWE-59 - Improper Link Resolution Before File Access ('Link Following')

Exploit availability: No

Description

The vulnerability allows a remote user to bypass implemented security restrictions.

The vulnerability exists due to a symlink race condition when creating directories. A remote authenticated user can use SMB1 or NFS symlink race to create directories on the Unix filesystem outside of the share definition.

Successful exploitation of the vulnerability requites that the user has permissions to create folder in the target directory.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

166) Link following

EUVDB-ID: #VU60187

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-44141

CWE-ID: CWE-59 - Improper Link Resolution Before File Access ('Link Following')

Exploit availability: No

Description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to insecure link following. A remote user with ability to write files to the exported part of the file system under a share via SMB1 unix extensions or via NFS can create a symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

167) Information disclosure

EUVDB-ID: #VU65849

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3800

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker can trick the victim into opening a specially crafted file to gain unauthorized access to sensitive information on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Dell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10

CPE2.3 External links

http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###