#VU7154 Authentication bypass in EMC Avamar


Published: 2017-06-21

Vulnerability identifier: #VU7154

Vulnerability risk: Low

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-4989

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
EMC Avamar
Client/Desktop applications / Software for system administration

Vendor: Dell

Description
The vulnerability allows a remote attacker to bypass authentication on the target system.

The weakness exists due to improper access control. A remote attacker can bypass security restrictions, access the system maintenance page to view sensitive information, perform software updates, and run maintenance workflows.

Successful exploitation of the vulnerability results in access to the system.

Mitigation
Update to version 7.2.1 with Hotfix 277897 and 7.3.1 with Hotfix 276676.

Vulnerable software versions

EMC Avamar: 7.2.0-401 - 7.3.1-125


External links
http://seclists.org/bugtraq/2017/Jun/att-40/ESA-2017-054.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability