8.2

CVE-2019-3736

Dell EMC Integrated Data Protection Appliance versions prior to 2.3 contain a password storage vulnerability in the ACM component. A remote authenticated malicious user with root privileges may potentially use a support tool to decrypt encrypted passwords stored locally on the system to use it to access other components using the privileges of the compromised user.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DellEmc Integrated Data Protection Appliance Firmware Version2.0
   DellEmc Idpa Dp4400 Version-
   DellEmc Idpa Dp5800 Version-
   DellEmc Idpa Dp8300 Version-
   DellEmc Idpa Dp8800 Version-
DellEmc Integrated Data Protection Appliance Firmware Version2.1
   DellEmc Idpa Dp4400 Version-
   DellEmc Idpa Dp5800 Version-
   DellEmc Idpa Dp8300 Version-
   DellEmc Idpa Dp8800 Version-
DellEmc Integrated Data Protection Appliance Firmware Version2.2
   DellEmc Idpa Dp4400 Version-
   DellEmc Idpa Dp5800 Version-
   DellEmc Idpa Dp8300 Version-
   DellEmc Idpa Dp8800 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.199
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:P/I:N/A:N
security_alert@emc.com 8.2 1.5 6
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CWE-257 Storing Passwords in a Recoverable Format

The storage of passwords in a recoverable format makes them subject to password reuse attacks by malicious users. In fact, it should be noted that recoverable encrypted passwords provide no significant benefit over plaintext passwords since they are subject not only to reuse by malicious attackers but also by malicious insiders. If a system administrator can recover a password directly, or use a brute force search on the available information, the administrator can use the password on other accounts.

CWE-327 Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.