#VU14740 Incorrect permission assignment for critical resource in VPLEX GeoSynchrony - CVE-2018-11078


Vulnerability identifier: #VU14740

Vulnerability risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-11078

CWE-ID: CWE-732

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
VPLEX GeoSynchrony
Server applications / Virtualization software

Vendor: Dell

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to insecure file permissions on VPlex Witness. A remote authenticated attacker can read from VPN configuration files and as a result intercept and decrypt all VPN traffic leveraging a MitM attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

VPLEX GeoSynchrony: 5.4 - 6.0


External links
https://seclists.org/fulldisclosure/2018/Sep/10


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability