#VU14127 Information disclosure in EMC NetWorker Server


Published: 2018-07-31 | Updated: 2018-07-31

Vulnerability identifier: #VU14127

Vulnerability risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11050

CWE-ID: CWE-312

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
EMC NetWorker Server
Server applications / Other server solutions

Vendor: Dell

Description

The vulnerability allows an adjacent attacker to obtain potentially sensitive information.

The vulnerability exists due to a flaw in the Rabbit MQ Advanced Message Queuing Protocol (AMQP) component. A remote attacker monitoring the local network collision domain can obtain clear text passwords that are sent to the remote AMQP service and access the target component with the privileges of the target user.

Mitigation
The vulnerability has been addressed in the versions 9.1.1.9, 9.2.1.4, 18.1.0.2.

Vulnerable software versions

EMC NetWorker Server: 9.0.0.0 - 18.1.0.1


External links
http://seclists.org/fulldisclosure/2018/Jul/92


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability