7.5
CVE-2019-3762
- EPSS 0.23%
- Published 18.03.2020 19:15:17
- Last modified 21.11.2024 04:42:28
- Source security_alert@emc.com
- Teams watchlist Login
- Open Login
Data Protection Central versions 1.0, 1.0.1, 18.1, 18.2, and 19.1 contains an Improper Certificate Chain of Trust Vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by obtaining a CA signed certificate from Data Protection Central to impersonate a valid system to compromise the integrity of data.
Data is provided by the National Vulnerability Database (NVD)
Dell ≫ Emc Data Protection Central Version1.0
Dell ≫ Emc Data Protection Central Version1.0.1
Dell ≫ Emc Data Protection Central Version18.1
Dell ≫ Emc Data Protection Central Version18.2
Dell ≫ Emc Data Protection Central Version19.1
Dell ≫ Emc Integrated Data Protection Appliance Version2.0
Dell ≫ Emc Integrated Data Protection Appliance Version2.1
Dell ≫ Emc Integrated Data Protection Appliance Version2.2
Dell ≫ Emc Integrated Data Protection Appliance Version2.3
Dell ≫ Emc Integrated Data Protection Appliance Version2.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.23% | 0.459 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
security_alert@emc.com | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
|
CWE-295 Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.
CWE-296 Improper Following of a Certificate's Chain of Trust
The product does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate.