Risk | Critical |
Patch available | YES |
Number of vulnerabilities | 167 |
CVE-ID | CVE-2022-0850 CVE-2022-0002 CVE-2022-0487 CVE-2022-0492 CVE-2022-0617 CVE-2022-0644 CVE-2022-0812 CVE-2022-0847 CVE-2022-1011 CVE-2021-45868 CVE-2022-1016 CVE-2022-1048 CVE-2022-1280 CVE-2022-1353 CVE-2022-1419 CVE-2022-1516 CVE-2022-23036 CVE-2022-23037 CVE-2022-0001 CVE-2021-44879 CVE-2022-23039 CVE-2022-21349 CVE-2022-21293 CVE-2022-21294 CVE-2022-21296 CVE-2022-21299 CVE-2022-21305 CVE-2022-21340 CVE-2022-21341 CVE-2022-21360 CVE-2021-43389 CVE-2022-21365 CVE-2017-7658 CVE-2018-7755 CVE-2019-20811 CVE-2021-20292 CVE-2021-20321 CVE-2021-38208 CVE-2021-39713 CVE-2022-23038 CVE-2022-23040 CVE-2022-21283 CVE-2021-3737 CVE-2022-24407 CVE-2017-16932 CVE-2022-29824 CVE-2022-23308 CVE-2021-4104 CVE-2021-3572 CVE-2021-3733 CVE-2021-4189 CVE-2019-20838 CVE-2022-0391 CVE-2022-29155 CVE-2020-25613 CVE-2021-31799 CVE-2021-31810 CVE-2021-32066 CVE-2018-25032 CVE-2022-1552 CVE-2020-14155 CVE-2017-7246 CVE-2022-23041 CVE-2022-28388 CVE-2022-23042 CVE-2022-23960 CVE-2022-24448 CVE-2022-24959 CVE-2022-26490 CVE-2022-26966 CVE-2022-27666 CVE-2022-28356 CVE-2022-28389 CVE-2017-7245 CVE-2022-28390 CVE-2022-28748 CVE-2021-28153 CVE-2022-0778 CVE-2021-43618 CVE-2017-7186 CVE-2017-7244 CVE-2022-21291 CVE-2022-21282 CVE-2017-3167 CVE-2020-1927 CVE-2019-0217 CVE-2019-0220 CVE-2019-9517 CVE-2019-10081 CVE-2019-10082 CVE-2019-10092 CVE-2019-10098 CVE-2020-1934 CVE-2020-1938 CVE-2020-9490 CVE-2020-11993 CVE-2020-35452 CVE-2021-26690 CVE-2021-26691 CVE-2021-30641 CVE-2021-33193 CVE-2021-34798 CVE-2019-0211 CVE-2019-0197 CVE-2021-40438 CVE-2017-15715 CVE-2017-3169 CVE-2017-7659 CVE-2017-7679 CVE-2017-9788 CVE-2017-9789 CVE-2017-9798 CVE-2017-15710 CVE-2018-1283 CVE-2019-0196 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2018-1312 CVE-2018-1333 CVE-2018-11763 CVE-2018-17189 CVE-2018-17199 CVE-2021-39275 CVE-2021-44224 CVE-2022-21248 CVE-2022-25235 CVE-2021-41103 CVE-2021-41190 CVE-2022-23648 CVE-2022-22576 CVE-2022-27776 CVE-2022-27781 CVE-2022-27782 CVE-2022-25236 CVE-2021-41091 CVE-2022-25313 CVE-2022-25314 CVE-2022-25315 CVE-2022-1304 CVE-2021-3999 CVE-2022-23218 CVE-2022-23219 CVE-2022-1271 CVE-2021-41092 CVE-2021-41089 CVE-2021-44790 CVE-2019-12423 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23943 CVE-2014-0230 CVE-2016-5388 CVE-2016-8745 CVE-2017-5647 CVE-2019-17566 CVE-2021-44142 CVE-2020-11987 CVE-2020-11988 CVE-2021-41079 CVE-2022-27772 CVE-2020-25721 CVE-2020-29361 CVE-2021-43566 CVE-2021-44141 CVE-2021-3800 |
CWE-ID | CWE-200 CWE-416 CWE-264 CWE-476 CWE-617 CWE-908 CWE-362 CWE-20 CWE-129 CWE-444 CWE-254 CWE-835 CWE-89 CWE-400 CWE-190 CWE-502 CWE-399 CWE-918 CWE-125 CWE-93 CWE-77 CWE-295 CWE-119 CWE-121 CWE-415 CWE-1037 CWE-909 CWE-401 CWE-122 CWE-61 CWE-592 CWE-601 CWE-787 CWE-79 CWE-457 CWE-22 CWE-284 CWE-94 CWE-276 CWE-843 CWE-287 CWE-303 CWE-281 CWE-193 CWE-522 CWE-668 CWE-59 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #3 is available. Public exploit code for vulnerability #4 is available. Vulnerability #8 is being exploited in the wild. Public exploit code for vulnerability #9 is available. Public exploit code for vulnerability #55 is available. Public exploit code for vulnerability #71 is available. Public exploit code for vulnerability #78 is available. Public exploit code for vulnerability #92 is available. Vulnerability #94 is being exploited in the wild. Vulnerability #103 is being exploited in the wild. Vulnerability #105 is being exploited in the wild. Public exploit code for vulnerability #107 is available. Public exploit code for vulnerability #109 is available. Public exploit code for vulnerability #112 is available. Public exploit code for vulnerability #130 is available. Public exploit code for vulnerability #136 is available. Public exploit code for vulnerability #147 is available. Public exploit code for vulnerability #158 is available. |
Vulnerable software |
Dell Secure Connect Gateway Server applications / Other server solutions |
Vendor | Dell |
Security Bulletin
This security bulletin contains information about 167 vulnerabilities.
EUVDB-ID: #VU63423
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0850
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in the copy_page_to_iter() function in iov_iter.c in Linux kernel. A local user can gain unauthorized access to sensitive information on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61199
Risk: Low
CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0002
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to non-transparent sharing of branch predictor within a context. A local user can gain unauthorized access to sensitive information on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61181
Risk: Low
CVSSv3.1: 5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-0487
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a use-after-free error in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. A local user can trigger a use-after-free error and gain access to sensitive information.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU61245
Risk: Low
CVSSv3.1: 7.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]
CVE-ID: CVE-2022-0492
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a logic error within the cgroup_release_agent_write() function in kernel/cgroup/cgroup-v1.c. A local user can use the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.
EUVDB-ID: #VU61210
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0617
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the Linux kernel UDF file system functionality. A local user can supply a malicious UDF image to the udf_file_write_iter() function and perform a denial of service (DoS) attack.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63860
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0644
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion error in the Linux kernel’s kernel_read_file_from_fd in the filesystem. A local user can attempt to read a file without read access/permission to perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64919
Risk: Low
CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0812
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c() function in RPCRDMA_HDRLEN_MIN (7). A local user can gain unauthorized access to sensitive information on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61110
Risk: Low
CVSSv3.1: 8.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]
CVE-ID: CVE-2022-0847
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to usage of an uninitialized resources. A local user can overwrite arbitrary file in the page cache, even if the file is read-only, and execute arbitrary code on the system with elevated privileges.
The vulnerability was dubbed Dirty Pipe.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU63386
Risk: Low
CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-1011
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the write() function of FUSE filesystem. A local user can retireve (partial) /etc/shadow hashes and execute arbitrary code with elevated privileges.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU63422
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-45868
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial-of-service attack.
The vulnerability exists due to fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). A local user can trigger use-after-free error and perform a denial-of-service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62028
Risk: Low
CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1016
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a use-after-free error in net/netfilter/nf_tables_core.c:nft_do_chain in Linux kernel.. A local user can trigger a use-after-free error and gain access to sensitive information.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63428
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1048
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to a use-after-free error in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. A local user can execute arbitrary code with elevated privileges and perform a denial-of-service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62358
Risk: Low
CVSSv3.1: 5.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1280
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a use-after-free error within the drm_lease_held() function in drivers/gpu/drm/drm_lease.c in the Linux kernel. A local user can run a specially crafted program to trigger a use-after-free error and crash the kernel or gain access to sensitive information.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63388
Risk: Low
CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1353
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the pfkey_register function in net/key/af_key.c in the Linux kernel. A local user can gain unauthorized access to kernel memory, leading to a system crash or a leak of internal kernel information.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63418
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1419
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in vgem_gem_dumb_create() function in Linux kernel. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63158
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1516
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference error in the Linux kernel’s X.25 set of standardized network protocols functionality. A local user can terminate session using a simulated Ethernet card and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63305
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23036
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in the blkfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63306
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23037
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in the netfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61198
Risk: Low
CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0001
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to non-transparent sharing of branch predictor selectors between contexts. A local user can gain unauthorized access to sensitive information on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62483
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-44879
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the gc_data_segment() function in fs/f2fs/gc.c. A local user can mount a specially crafted f2fs image, trigger a NULL pointer dereference and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63308
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23039
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in the gntalloc ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59718
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21349
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the 2D component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59730
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21293
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59731
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21294
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59726
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21296
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the JAXP component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59727
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21299
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the JAXP component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59720
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21305
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59732
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21340
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59733
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21341
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Serialization component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59722
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21360
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the ImageIO component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63385
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-43389
CWE-ID:
CWE-129 - Improper Validation of Array Index
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to improper validation of array index in the ISDN CAPI implementation within detach_capi_ctr() function in drivers/isdn/capi/kcapi.c. A local user can send specially crafted data to the system and execute arbitrary code with elevated privileges.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59723
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21365
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the ImageIO component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13529
Risk: Low
CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-7658
CWE-ID:
CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to conduct an HTTP request smuggling attack on the target system.
The vulnerability exists due to improper handling HTTP requests that contain more than one content-length header. A remote attacker can send a specially crafted HTTP request that contains a transfer-encoding header and a content-length header, cause the software and an upstream HTTP agent to misinterpret the boundary of the request and to poison the web cache on the system, which could be used to conduct further attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10918
Risk: Low
CVSSv3.1: 3.5 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-7755
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local unauthenticated attacker to bypass security restrictions on the target system.
The weakness exists in the drivers/block/floppy.c source code in the fd_locked_ioctl function due to insufficient security restrictions. A local attacker can bypass security restrictions through the system floppy drive and obtain kernel code and data from the system.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU34374
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-20811
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to manipulate data.
An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63382
Risk: Low
CVSSv3.1: 7.1 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-20292
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges.
The vulnerability exists due to a use-after-free error in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. A local user can escalate privileges and execute code in the context of the kernel.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59084
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-20321
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attacks.
The vulnerability exists due to a race condition when accessing file object in the Linux kernel OverlayFS subsystem. A local user can rename files in specific way with OverlayFS and perform a denial of service (DoS) attack.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63383
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-38208
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the net/nfc/llcp_sock.c component. A remote attacker can make getsockname call and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63350
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-39713
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to multiple issues in Qdisc implementation related to rcu read lock. A local application can execute arbitrary code with elevated privileges.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63307
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23038
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in the scsifront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63309
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23040
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in the xenbus ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59729
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21283
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59089
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-3737
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop. A remote attacker who controls a malicious server can force the client to enter an infinite loop on a 100 Continue response.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60842
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-24407
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of password in the SQL plugin shipped with Cyrus SASL. A remote non-authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9542
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-16932
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in parser.c function due to improper handling of certain parameter entities. A remote attacker can supply specially constructed XML data, trigger resource exhaustion and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62741
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29824
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*). A remote attacker can pass specially crafted multi-gigabyte XML file to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60922
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23308
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing ID and IDREF attributes in valid.c. A remote attacker can pass specially crafted XML input to the application, trigger a use-after-free error and crash the application or execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58977
Risk: Medium
CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-4104
CWE-ID:
CWE-502 - Deserialization of Untrusted Data
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data in JMSAppender, when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution.
Note this issue only affects Log4j 1.2 when specifically configured to
use JMSAppender, which is not the default.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62512
Risk: Medium
CVSSv3.1: 5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-3572
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated user to manipulate data.
The vulnerability exists due to improper input validation within the Policy (python-pip) component in Oracle Communications Cloud Native Core Policy. A remote authenticated user can exploit this vulnerability to manipulate data.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58295
Risk: Low
CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-3733
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the application within the AbstractBasicAuthHandler class in urllib. A remote attacker with control over the server can perform regular expression denial of service attack during authentication.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61681
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-4189
CWE-ID:
CWE-918 - Server-Side Request Forgery (SSRF)
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input in the FTP (File Transfer Protocol) client library when using it in PASV (passive) mode. A remote attacker can set up a malicious FTP server, trick the FTP client in Python into connecting back to a given IP address and port, which can lead to FTP client scanning ports which otherwise would not have been possible.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU30256
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-20838
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and X or R has more than one fixed quantifier, a related issue to CVE-2019-20454.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61675
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0391
CWE-ID:
CWE-93 - Improper Neutralization of CRLF Sequences ('CRLF Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to inject arbitrary data in server response.
The vulnerability exists due to insufficient validation of attacker-supplied data within the urllib.parse module in Python. A remote attacker can pass specially crafted data to the application containing CR-LF characters and modify application behavior.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63343
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29155
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the experimental back-sql backend to slapd during an LDAP search operation when the search filter is processed. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU47333
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C]
CVE-ID: CVE-2020-25613
CWE-ID:
CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to preform HTTP request smuggling attacks.
The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.
Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU52796
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-31799
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55488
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-31810
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists within Net::FTP in Ruby when processing PASV responses. A remote attacker can trick the victim to connect to a malicious FTP server and trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55489
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-32066
CWE-ID:
CWE-295 - Improper Certificate Validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists in Net::IMAP in Ruby, due to the gem does not raise an exception when StartTLS fails with an an unknown response. A remote attacker can perform a man-in-the-middle (MitM) attack.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61671
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-25032
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when compressing data. A remote attacker can pass specially crafted input to the application, trigger memory corruption and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63126
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1552
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to incorrectly imposed security restrictions in Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck. A remote authenticated user with permission to create non-temp objects can execute arbitrary SQL functions under a superuser identity and escalate privileges within the application.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU29488
Risk: High
CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-14155
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow. A remote attacker can pass a large number after a (?C substring, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7567
Risk: Medium
CVSSv3.1: 7.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-7246
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in pcre32_copy_substring() function in pcre_get.c in libpcre1 in PCRE 8.40. A remote unauthenticated attacker can create a specially crafted file, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63310
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23041
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls ring buffers. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63160
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-28388
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to boundary error in the usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c. A local user can pass specially crafted data to the application, trigger double free error and execute arbitrary code with elevated privileges.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63311
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23042
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to reachable assertion in the netfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65007
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23960
CWE-ID:
CWE-1037 - Processor optimization removal or modification of security-critical code
Exploit availability: No
DescriptionThe vulnerability allows a local user to obtain potentially sensitive information.
The vulnerability exists due to improper restrictions of cache speculation. A local user can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches and gain access to sensitive information.
The vulnerability was dubbed Spectre-BHB.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61211
Risk: Low
CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-24448
CWE-ID:
CWE-909 - Missing initialization of resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to missing initialization of resource within the fs/nfs/dir.c in the Linux kernel. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62482
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-24959
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the yam_siocdevprivate() function in drivers/net/hamradio/yam.c. A local user can perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62601
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-26490
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the st21nfca_connectivity_event_received() function in drivers/nfc/st21nfca/se.c in Linux kernel. A local user can run a specially crafted program to trigger buffer overflow and execute arbitrary code with elevated privileges.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63318
Risk: Low
CVSSv3.1: 5.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-26966
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to a use-after-free error in drivers/net/usb/sr9700.c in the Linux kernel. A remote attacker can pass specially crafted data and obtain sensitive information from heap memory.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61672
Risk: Low
CVSSv3.1: 6.3 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-27666
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c in Linux kernel. A local unprivileged user can pass specially crafted data to the system, trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU63390
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-28356
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak in net/llc/af_llc.c component. A remote attacker can force the system to leak memory and perform denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63162
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-28389
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to boundary error in mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c. A local user can pass specially crafted data to the application, trigger double free error and execute arbitrary code with elevated privileges.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7566
Risk: Medium
CVSSv3.1: 7.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-7245
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in pcre32_copy_substring() function in pcre_get.c in libpcre1 in PCRE 8.40. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63164
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-28390
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to boundary error in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c. A local user can pass specially crafted data to the application, trigger double free error and execute arbitrary code with elevated privileges.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63419
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-28748
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain access to sensitive information.
The vulnerability exists due memory leak when working with ax88179_178a devices. An attacker with physical access to the system can inject a malicious USB-drive and remotely obtain data from kernel memory.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51454
Risk: Low
CVSSv3.1: 2.2 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-28153
CWE-ID:
CWE-61 - UNIX Symbolic Link (Symlink) Following
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a symlink following issue, when g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
Successful exploitation of this vulnerability may result in privilege escalation.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61391
Risk: Medium
CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-0778
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the BN_mod_sqrt() function when processing an ASN.1 certificate that contains elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. A remote attacker can supply a specially crafted certificate to the TLS server or client, consume all available system resources and cause denial of service conditions.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU63553
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-43618
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in mpz/inp_raw.c. A remote attacker can pass specially crafted data to the application, trigger integer overflow and cause a denial of service condition on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7564
Risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-7186
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to a segmentation violation issue by the libpcre1 and libpcre2. A remote attacker can send specially crafted packets and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7565
Risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-7244
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to invalid memory read flaw in the _pcre32_xclass function in pcre_xclass.c. A remote attacker can trick the victim into loading a specially crafted file and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59719
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21291
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59725
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21282
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the JAXP component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7115
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-3167
CWE-ID:
CWE-592 - Authentication Bypass Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to usage of the ap_get_basic_auth_pw() function by third-party modules outside of the authentication phase. A remote attacker can create a specially crafted HTTP request to vulnerable web server, bypass authentication requirements and gain unauthorized access to otherwise protected information.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26527
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-1927
CWE-ID:
CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to redirect victims to arbitrary URL.
The vulnerability exists due to improper sanitization of user-supplied data in some "mod_rewrite" configurations. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU18111
Risk: Low
CVSSv3.1: 5.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-0217
Exploit availability: No
DescriptionInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU18113
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-0220
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to the web server does not merge consecutive slashes in URLs, that can lead to incorrect processing of requests when accessing CGI programs. Such web server behavior may lead to security restrictions bypass.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20340
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-9517
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect implementation of HTTP/2 protocol. A remote attacker can open the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both. MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20373
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-10081
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service attack.
The vulnerability exists due to a boundary error when processing HTTP/2 requests within the mod_http2 module, configured with "H2PushResource". A remote attacker can send specially crafted HTTP/2 requests to the affected server and perform denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20386
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-10082
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the mod_http2 when handling connection shutdown. A remote attacker can send specially crafted requests to the affected server and make the mod_http2 to read memory that was already freed.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20384
Risk: Low
CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-10092
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data on the mod_proxy error page. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20374
Risk: Medium
CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C]
CVE-ID: CVE-2019-10098
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to incorrect handling of encoded line break characters within rewrite rules. A remote attacker can send a specially crafted HTTP request and potentially bypass security restrictions.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU26528
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-1934
CWE-ID:
CWE-457 - Use of Uninitialized Variable
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to the "mod_proxy_ftp" may use uninitialized memory when proxying to a malicious FTP server. A remote attacker can gain unauthorized access to sensitive information on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU25502
Risk: High
CVSSv3.1: 9.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]
CVE-ID: CVE-2020-1938
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Apache Tomcat AJP connector. A remote attacker can send a specially crafted AJP request, include and execute arbitrary files on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU35880
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-9490
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing Cache-Digest header in HTTP/2 request. A remote attacker can pass specially crafted HTTP/2 request to the Apache HTTP Server, trigger the server to send the HTTP/2
PUSH and perform a denial of service (DoS) attack.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU35854
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-11993
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the application while processing HTTP/2 requests with enabled trace/debug for HTTP/2 connections. A remote attacker can send specially crafted HTTP/2 requests to Apache HTTP Server and force it to make logging statements on wrong connection for certain traffic edge patterns. This results in concurrent use of memory pools for separate connections and triggers denial of service condition.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU53775
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-35452
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing Digest nounces in mod_auth_digest. A remote unauthenticated attacker can send a specially crafted HTTP request, trigger stack overflow by one nul byte and crash the server.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU53777
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-26690
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in mod_session. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU53776
Risk: Low
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-26691
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in mod_session. A a malicious backend server or SessionHeader can trigger a denial of service (DoS) condition.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU53774
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-30641
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to incorrect parsing of Apache configuration files. An unexpected
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56474
Risk: Medium
CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-33193
CWE-ID:
CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to preform HTTP/2 request smuggling attacks.
The vulnerability exists due to improper validation of HTTP/2 requests in mod_proxy in Apache HTTP Server. A remote attacker can send a specially crafted HTTP/2 request to the server and smuggle arbitrary HTTP headers.
Successful exploitation of vulnerability may allow an attacker to poison web server cache and perform phishing attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56681
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-34798
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can send a specially crafted HTTP request to the affected web server and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU18110
Risk: Low
CVSSv3.1: 5.1 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:H/RL:O/RC:C]
CVE-ID: CVE-2019-0211
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists within MPM implementation due to the application does not properly maintain each child's listener bucket number in the scoreboard that may lead to unprivileged code or scripts run by server (e.g. via mod_php) to modify the scoreboard and abuse the privileged main process.
A local user can execute arbitrary code on the system with privileges of the Apache HTTP Server code process.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU18108
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-0197
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error within the mod_http2 module when processing update requests from http/1.1 to http/2, if this was not the first request on a connection. A remote attacker can send specially crafted requests to the affected server and perform denial of service attack.
Successful exploitation of the vulnerability requires that HTTP/2 protocol is enabled for a "http:" host or H2Upgrade is enabled for h2 on a "https:" host.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56678
Risk: High
CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N/E:H/RL:O/RC:C]
CVE-ID: CVE-2021-40438
CWE-ID:
CWE-918 - Server-Side Request Forgery (SSRF)
Exploit availability: Yes
DescriptionThe disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input within the mod_proxy module in Apache HTTP Server. A remote attacker can send a specially crafted HTTP request with a chosen uri-path and trick the web server to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU11284
Risk: Low
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-15715
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists on systems that allow uploading of user-specified filenames due to the '<FilesMatch>' expression may not correctly match characters in a filename. A remote attacker can supply a specially crafted filename to potentially bypass security
controls that use the '<FilesMatch>' directive.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7116
Risk: Medium
CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-3169
CWE-ID:
CWE-592 - Authentication Bypass Issues
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to perform denial of service attack.
The vulnerability exists due to a NULL pointer dereference error within mod_ssl module, when third-party modules call ap_hook_process_connection() function during an HTTP request to an HTTPS port. A remote attacker can send a specially crafted HTTP request and crash the affected web server.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU7118
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-7659
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service attack.
The vulnerability exists due to a NULL pointer dereference error within mod_http2. A remote attacker can send a specially crafted HTTP/2 request and crash the affected process.
Successful exploitation of the vulnerability result in denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7119
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-7679
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to out-of-bounds read within the mod_mime when constructing Content-Type response header. A remote attacker read one byte pas the end of a buffer when sending a malicious Content-Type response header.
Mitigation
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU7517
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-9788
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information on the targeted system.
The weakness exists due to improper initialization of the value placeholder in [Proxy-]Authorization headers of type 'Digest' before or between successive key=value assignments by mod_auth_digest. A remote attacker can provide an initial key with no '=' assignment to cause the stale value of uninitialized pool memory used by the prior request to leak.
Successful exploitation of the vulnerability results in information disclosure.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7518
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-9789
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote unauthenticated attacker to cause DoS condition on the targeted system.
The weakness exists due to use-after-free condition in the mod_http2 function. A remote attacker can trigger memory corruption and cause the server to crash.
Successful exploitation of the vulnerability results in denial of service.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU8504
Risk: Low
CVSSv3.1: 5.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:F/RL:O/RC:C]
CVE-ID: CVE-2017-9798
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to use-after-free error when processing HTTP OPTIONS requests in server/core.c, when limits are configured in .htaccess or httpd.conf configuration files. A remote unauthenticated attacker can read portions of memory through HTTP OPTIONS requests and gain access to potentially sensitive data.
The vulnerability is dubbed Optionsbleed.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.
EUVDB-ID: #VU11283
Risk: Medium
CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-15710
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in HTTPD mod_authnz_ldap due to improper validation of user-supplied input. A remote attacker can send a specially crafted Accept-Language header value, trigger an out-of-bounds memory write error and potentially cause
the target service to crash.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11282
Risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-1283
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to modify data on the target system.
The weakness exists on systems with mod_session configured with SessionEnv on to forward session data to CGI applications due to improper input validation. A remote attacker can send a specially
crafted 'Session' header value to potentially modify mod_session data.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU18109
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-0196
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service attack.
The vulnerability exists due to a use-after-free error within the mod_http2 module when processing HTTP/2 requests. A remote attacker can make the application to access freed memory during string comparison when determining the method of a request and process the request incorrectly.
Successful exploitation of the vulnerability may allow an attacker to gain access to sensitive information or perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11281
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-1301
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to improper validation of user-supplied input. A remote attacker can send a specially crafted HTTP request to trigger an out-of-bounds
memory access error after a header size limit has been reached to cause
the target service to crash.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11287
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-1302
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to improper destruction of an HTTP/2 stream after being handled. A remote attacker can send a specially crafted HTTP/2 stream, write a NULL pointer value to an already freed memory space and cause the service to crash.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11280
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-1303
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in Apache HTTPD mod_cache_socache due to improper validation of user-supplied input. A remote attacker can send a specially crafted HTTP request header, trigger an out-of-bounds memory read error in mod_cache_socache and
cause the target service to crash.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11279
Risk: Low
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-1312
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists in Apache HTTPD mod_auth_digest due to improper generation of HTTP Digest authentication nonce. A remote attacker can replay HTTP requests across the cluster without detection by the target server(s) and bypass replay protection.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13908
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-1333
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to insufficient filtering of incoming data within "mod_http2" apache module. A remote attacker can send a specially crafted HTTP request to the affected web server and trigger daemon crash.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU14913
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-11763
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect handling of large SETTINGS frames in HTTP/2 connections. A remote attacker can repeatedly send large SETTINGS frames within an established HTTP/2 connection and consume all available threads and CPU time.
Successful exploitation of the vulnerability may allow an attacker to perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17177
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-17189
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to an error when handling malicious input. A remote attacker can send a specially crafted request bodies in a slow loris way to plain resources and cause the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17178
Risk: Low
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-17199
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to mod_session checks the session expiry time before decoding the session. A remote attacker сan cause session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded and reuse old session credentials or session IDs, which the attacker could use to access web pages previously accessed by a targeted user.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56679
Risk: Medium
CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-39275
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system or perform a denial of service attack.
The vulnerability exists due to a boundary error within the ap_escape_quotes() function. A remote attacker can send a specially crafted request to the web server, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires that the Apache module passes untrusted data to the affected function.
According to vendor, No included modules pass untrusted data to these functions
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59057
Risk: Medium
CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-44224
CWE-ID:
CWE-918 - Server-Side Request Forgery (SSRF)
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input in forward proxy configurations. A remote attacker can send a specially crafted HTTP request and trick the web server to initiate requests to arbitrary systems or cause NULL pointer dereference error and crash the web server.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
SSRF if possible for configuration that mix forward and reverse proxy.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59734
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21248
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Serialization component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60736
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-25235
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the affected application lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57038
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-41103
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions for container root directories and some plugins. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host can discover, read, and modify those files.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58229
Risk: Low
CVSSv3.1: 2.6 [CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-41190
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the system.
The vulnerability exists due to a type confusion error. A remote authenticated attacker can pass specially crafted data to the application, trigger a type confusion error and interpret the resulting content differently.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60972
Risk: Medium
CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-23648
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to an error when handling specially crafted image configuration in containerd where containers launched through containerd’s CRI implementation. A remote attacker can bypass any policy-based enforcement on container setup and access the read-only copies of arbitrary files and directories on the host.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU62640
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-22576
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error when re-using OAUTH2 connections for SASL-enabled protocols, such as SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only). libcurl may reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. As a result, a connection that is successfully created and authenticated with a user name + OAUTH2 bearer can subsequently be erroneously reused even for user + [other OAUTH2 bearer], even though that might not even be a valid bearer.
A remote attacker can exploit this vulnerability against applications intended for use in multi-user environments to bypass authentication and gain unauthorized access to victim's accounts.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62644
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-27776
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to curl can leak authentication or cookie header data during HTTP redirects to the same host but another port number. When asked to send custom headers or cookies in its HTTP requests, curl sends that set of headers only to the host which name is used in the initial URL, so that redirects to other hosts will make curl send the data to those. However, due to a flawed check, curl wrongly also sends that same set of headers to the hosts that are identical to the first one but use a different port number or URL scheme.
The vulnerability exists due to an incomplete fix for #VU10224 (CVE-2018-1000007).
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63008
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-27781
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop when handling requests with the CURLOPT_CERTINFO option. A remote attacker can consume all available system resources and cause denial of service conditions.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63009
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-27782
CWE-ID:
CWE-303 - Incorrect Implementation of Authentication Algorithm
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the way libcurl handles previously used connections in a connection pool for subsequent transfers. Several TLS and SSH settings were left out from the configuration match checks, resulting in erroneous matches for different resources. As a result, libcurl can send authentication string from one resource to another, exposing credentials to a third-party.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60733
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-25236
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper protection against insertion of namesep characters into namespace URIs in xmlparse.c. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64416
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C]
CVE-ID: CVE-2021-41091
CWE-ID:
CWE-281 - Improper preservation of permissions
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU60737
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-25313
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in build_model. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60738
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-25314
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in copyString. A remote attacker can pass specially crafted data to the application, trigger integer overflow and cause a denial of service condition on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60739
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-25315
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in storeRawNames function. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64075
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1304
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input. A local attacker can use a specially crafted filesystem, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61293
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-3999
CWE-ID:
CWE-193 - Off-by-one Error
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to an off-by-one error glibc getcwd() function. A remote attacker can pass specially crafted input to the application that is using the affected library version, trigger an off-by-one error and execute arbitrary code on the target system.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61294
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23218
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the svcunix_create() in the sunrpc module ib glibc. A remote attacker can pass specially crafted input to the application that is using the affected library version, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61295
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23219
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the clnt_create() function in the sunrpc module. A remote attacker can pass specially crafted input to the application that is using the affected library version, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62002
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1271
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient validation when processing filenames with two or more newlines. A remote attacker can force zgrep or xzgrep to write arbitrary files on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise the affected system.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64417
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-41092
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64415
Risk: Low
CVSSv3.1: 5.5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-41089
CWE-ID:
CWE-281 - Improper preservation of permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59056
Risk: Critical
CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2021-44790
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when parsing multipart content in mod_lua. A remote attacker can send a specially crafted HTTP request to the affected web server, trigger buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU27701
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-12423
CWE-ID:
CWE-522 - Insufficiently Protected Credentials
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access ti sensitive information.
The vulnerability exists due to the application allows a client to obtain the keys from a JWK keystore file, by setting the configuration parameter "rs.security.keystore.type" to "jwk". A remote non-authenticated attacker can obtain all private key and secret key credentials and gain unauthorized access to the application.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61287
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-22719
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized value in r:parsebody. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61286
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-22720
CWE-ID:
CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to preform HTTP request smuggling attacks.
The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.
Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61285
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-22721
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow within the ap_escape_html2() function when parsing LimitXMLRequestBody. A remote attacker can send a specially crafted request to the web server, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61284
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23943
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in mod_sed. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64581
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2014-0230
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to Apache Tomcat does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body. A remote attacker can cause a denial of service (thread consumption) via a series of aborted upload attempts.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64586
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-5388
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable. A remote attacker can redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5449
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-8745
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists to error within the send file code for the NIO HTTP connector, which causes current Processor object being added to the Processor cache multiple times. This behavior means that sharing the same Processor for concurrent requests can lead to leakage of potentially sensitive information between requests, such as session ID, request body, etc.
Successful exploitation of the vulnerability may allow an attacker to obtain potentially sensitive information.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6674
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5647
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists in the handling of the pipelined requests when send file was used resulted in the pipelined request being lost when send file processing of the previous request completed. A remote attacker can cause responses to appear to be sent for the wrong request.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU29068
Risk: Medium
CVSSv3.1: 5.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-17566
CWE-ID:
CWE-918 - Server-Side Request Forgery (SSRF)
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of "xlink:href" attributes. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60186
Risk: High
CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2021-44142
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing EA metadata while opening files in smbd within the VFS Samba module (vfs_fruit). A remote attacker with ability to write to file's extended attributes can trigger an out-of-bounds write and execute arbitrary code with root privileges.
Note, the vulnerability in vfs_fruit exists in the default configuration of the fruit VFS module using fruit:metadata=netatalk or fruit:resource=file.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU52501
Risk: Medium
CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-11987
CWE-ID:
CWE-918 - Server-Side Request Forgery (SSRF)
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54291
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-11988
CWE-ID:
CWE-918 - Server-Side Request Forgery (SSRF)
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input within the XMPParser in Apache XmlGraphics Commons. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56634
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-41079
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop when processing certain TLS packets. A remote attacker can send a specially crafted packet to the application, consume all available system resources and cause denial of service conditions.
Successful exploitation of vulnerability requires that Apache Tomcat is configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65829
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-27772
CWE-ID:
CWE-668 - Exposure of resource to wrong sphere
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a temporary directory hijacking. A local user can trigger the vulnerability and escalate privileges on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58094
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-25721
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests. A remote attacker can bypass authentication process and gain unauthorized access to the application.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU48944
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-29361
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a unspecified boundary error, related to processing of RPC requests. A remote attacker can perform a denial of service (DoS) attack.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59345
Risk: Low
CVSSv3.1: 2.3 [CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-43566
CWE-ID:
CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to a symlink race condition when creating directories. A remote authenticated user can use SMB1 or NFS symlink race to create directories on the Unix filesystem outside of the share definition.
Successful exploitation of the vulnerability requites that the user has permissions to create folder in the target directory.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60187
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-44141
CWE-ID:
CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to insecure link following. A remote user with ability to write files to the exported part of the file system under a share via SMB1 unix extensions or via NFS can create a symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition.
Install update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65849
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-3800
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote attacker can trick the victim into opening a specially crafted file to gain unauthorized access to sensitive information on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsDell Secure Connect Gateway: 5.00.00.10 - 5.10.00.10
CPE2.3http://www.dell.com/support/kbdoc/nl-nl/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
http://www.dell.com/support/kbdoc/en-us/000201854/dsa-2022-173-dell-emc-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.