Vulnerability identifier: #VU66109
Vulnerability risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID:
CWE-ID:
CWE-287
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Dell PowerProtect Cyber Recovery
Other software /
Other software solutions
Vendor: Dell
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an authentication bypass. A remote attacker may potentially access and interact with the docker registry API leading to an authentication bypass and loss of integrity and confidentiality
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Dell PowerProtect Cyber Recovery: before 19.11.0.2
External links
http://www.dell.com/support/kbdoc/nl-nl/000201970/dsa-2022-196-dell-emc-cyber-recovery-security-update-for-multiple-vulnerabilities
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.