Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2023-28079 CVE-2023-28080 CVE-2023-32448 |
CWE-ID | CWE-276 CWE-427 CWE-312 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
PowerPath Windows Other software / Other software solutions |
Vendor | Dell |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU76581
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2023-28079
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local user with access to the system can view contents of files and directories or modify them.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPowerPath Windows: 7.0 - 7.2
Fixed software versionsCPE2.3 External links
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU76582
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2023-28080
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the application loads DLL libraries in an insecure manner. A local user can place a specially crafted .dll file on the system and execute arbitrary code with elevated privileges.
Install updates from vendor's website.
Vulnerable software versionsPowerPath Windows: 7.0 - 7.2
Fixed software versionsCPE2.3 External links
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU76583
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2023-32448
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to the application stores its license key stored locally in clear text. A local user with access to the installation directory can retrieve the license key of the product and use it to install and license PowerPath on different systems.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPowerPath Windows: 7.0 - 7.2
Fixed software versionsCPE2.3 External links
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?