8.3

CVE-2025-21120

Dell Avamar, versions prior to 19.10 SP1 with patch 338904, contains a Trusting HTTP Permission Methods on the Server-Side vulnerability in Security. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DellAvamar Version19.4 SwEditionvirtual SwPlatformesxi
DellAvamar Version19.4 SwEditionvirtual SwPlatformvmware
DellAvamar Version19.4 SwEditionvirtual SwPlatformvsphere
DellAvamar Version19.7 SwEditionvirtual SwPlatformesxi
DellAvamar Version19.7 SwEditionvirtual SwPlatformvmware
DellAvamar Version19.7 SwEditionvirtual SwPlatformvsphere
DellAvamar Version19.8 SwEditionvirtual SwPlatformesxi
DellAvamar Version19.8 SwEditionvirtual SwPlatformvmware
DellAvamar Version19.8 SwEditionvirtual SwPlatformvsphere
DellAvamar Version19.9 SwEditionvirtual SwPlatformesxi
DellAvamar Version19.9 SwEditionvirtual SwPlatformvmware
DellAvamar Version19.9 SwEditionvirtual SwPlatformvsphere
DellAvamar Version19.10 Update- SwEditionvirtual SwPlatformesxi
DellAvamar Version19.10 Update- SwEditionvirtual SwPlatformvmware
DellAvamar Version19.10 Update- SwEditionvirtual SwPlatformvsphere
DellAvamar Version19.10 Updatesp1 SwEditionvirtual SwPlatformesxi
DellAvamar Version19.10 Updatesp1 SwEditionvirtual SwPlatformvmware
DellAvamar Version19.10 Updatesp1 SwEditionvirtual SwPlatformvsphere
DellAvamar Version19.12 SwEditionvirtual SwPlatformesxi
DellAvamar Version19.12 SwEditionvirtual SwPlatformvmware
DellAvamar Version19.12 SwEditionvirtual SwPlatformvsphere
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.243
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
security_alert@emc.com 8.3 2.8 5.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
CWE-650 Trusting HTTP Permission Methods on the Server Side

The server contains a protection mechanism that assumes that any URI that is accessed using HTTP GET will not cause a state change to the associated resource. This might allow attackers to bypass intended access restrictions and conduct resource modification and deletion attacks, since some applications allow GET to modify state.