8.2
CVE-2021-43587
- EPSS 0.03%
- Published 21.12.2021 17:15:08
- Last modified 21.11.2024 06:29:29
- Source security_alert@emc.com
- Teams watchlist Login
- Open Login
Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges.
Data is provided by the National Vulnerability Database (NVD)
Dell ≫ Powerpath Management Appliance Version2.6
Dell ≫ Powerpath Management Appliance Version3.0 Update-
Dell ≫ Powerpath Management Appliance Version3.0 Updatepatch_01
Dell ≫ Powerpath Management Appliance Version3.1
Dell ≫ Powerpath Management Appliance Version3.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.063 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
security_alert@emc.com | 8.2 | 1.5 | 6 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
|
CWE-321 Use of Hard-coded Cryptographic Key
The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.