7.2
CVE-2023-48667
- EPSS 0.03%
- Published 14.12.2023 16:15:50
- Last modified 21.11.2024 08:32:13
- Source security_alert@emc.com
- Teams watchlist Login
- Open Login
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker.
Data is provided by the National Vulnerability Database (NVD)
Dell ≫ Apex Protection Storage Version < 6.2.1.110
Dell ≫ Apex Protection Storage Version >= 7.0 < 7.10.1.15
Dell ≫ Powerprotect Data Domain SwEditionvirtual Version < 6.2.1.110
Dell ≫ Powerprotect Data Domain SwEditionvirtual Version >= 7.0 < 7.12.0.0
Dell ≫ Powerprotect Data Domain Management Center Version < 6.2.1.110
Dell ≫ Powerprotect Data Domain Management Center Version >= 7.0 < 7.13.0.10
Dell ≫ Emc Data Domain Os Version < 6.2.1.110
Dell ≫ Emc Data Domain Os Version >= 7.0 < 7.12.0.0
Dell ≫ Emc Data Domain Os SwEditionlts2022 Version >= 7.7 < 7.7.5.25
Dell ≫ Emc Data Domain Os SwEditionlts2023 Version >= 7.10 < 7.10.1.15
Dell ≫ Powerprotect Data Domain Management Center SwEditionlts2022 Version >= 7.7 < 7.7.5.25
Dell ≫ Powerprotect Data Domain Management Center SwEditionlts2023 Version >= 7.10 < 7.10.1.15
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.076 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
security_alert@emc.com | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.