#VU66109 Improper Authentication in Dell PowerProtect Cyber Recovery - CVE-2022-34372


Vulnerability identifier: #VU66109

Vulnerability risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2022-34372

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Dell PowerProtect Cyber Recovery
Other software / Other software solutions

Vendor: Dell

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an authentication bypass. A remote attacker may potentially access and interact with the docker registry API leading to an authentication bypass and loss of integrity and confidentiality

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Dell PowerProtect Cyber Recovery: before 19.11.0.2


External links
http://www.dell.com/support/kbdoc/nl-nl/000201970/dsa-2022-196-dell-emc-cyber-recovery-security-update-for-multiple-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability