Vulnerability identifier: #VU7154
Vulnerability risk: Low
CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-284
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
EMC Avamar
Client/Desktop applications /
Software for system administration
Vendor: Dell
Description
The vulnerability allows a remote attacker to bypass authentication on the target system.
The weakness exists due to improper access control. A remote attacker can bypass security restrictions, access the system maintenance page to view sensitive information, perform software updates, and run maintenance workflows.
Successful exploitation of the vulnerability results in access to the system.
Mitigation
Update to version 7.2.1 with Hotfix 277897 and 7.3.1 with Hotfix 276676.
Vulnerable software versions
EMC Avamar: 7.2.0-401 - 7.3.1-125
External links
http://seclists.org/bugtraq/2017/Jun/att-40/ESA-2017-054.txt
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.