8
CVE-2021-36338
- EPSS 0.16%
- Published 21.01.2022 21:15:08
- Last modified 21.11.2024 06:13:32
- Source security_alert@emc.com
- Teams watchlist Login
- Open Login
Unisphere for PowerMax versions prior to 9.2.2.2 contains a privilege escalation vulnerability. An adjacent malicious user could potentially exploit this vulnerability to escalate their privileges and access functionalities they do not have access to. CVE-2022-31233 addresses the partial fix in CVE-2021-36338.
Data is provided by the National Vulnerability Database (NVD)
Dell ≫ Solutions Enabler Version < 9.1.0.18
Dell ≫ Solutions Enabler Version >= 9.2.0.0 < 9.2.3.0
Dell ≫ Solutions Enabler Virtual Appliance Version < 9.1.0.18
Dell ≫ Solutions Enabler Virtual Appliance Version >= 9.2.0.0 < 9.2.3.0
Dell ≫ Unisphere 360 Version < 9.1.0.29
Dell ≫ Unisphere 360 Version >= 9.2.0.0 < 9.2.3.3
Dell ≫ Unisphere For Powermax Version < 9.1.0.31
Dell ≫ Unisphere For Powermax Version >= 9.2.0.0 < 9.2.3.4
Dell ≫ Unisphere For Powermax Virtual Appliance Version < 9.1.0.31
Dell ≫ Unisphere For Powermax Virtual Appliance Version >= 9.2.0.0 < 9.2.3.4
Dell ≫ Powermax Os Version5978
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.16% | 0.375 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8 | 2.1 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 5.2 | 5.1 | 6.4 |
AV:A/AC:L/Au:S/C:P/I:P/A:P
|
security_alert@emc.com | 6.3 | 2.1 | 4.2 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
|
CWE-565 Reliance on Cookies without Validation and Integrity Checking
The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.
CWE-602 Client-Side Enforcement of Server-Side Security
The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.